Symantec Products Intel Alert Management System Vulnerabilities
RISK: Medium Risk
TYPE: Servers - Other Servers
Multiple vulnerabilities have been identified in various Symantec products, which could be exploited by remote attackers or malicious users to cause a denial of service or take complete control of a vulnerable system. These issues are caused by buffer overflow and input validation errors in the Intel Alert Management System (AMS2) when processing user-supplied packets, which could allow attackers or malicious users to trigger arbitrary events (launching a program, sending an email), shutdown the service, or execute arbitray code.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Symantec AntiVirus Corporate Edition Server (SAVCE) versions 10.x
- Symantec Systems Center (SSC) versions 10.x
- Symantec Quarantine Server version 3.6
- Symantec Quarantine Server version 3.5
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Symantec AntiVirus Corporate Edition Server
Upgrade to SAVCE 10.1 MR10Symantec System Center
Upgrade to SSC from SAVCE 10.1 MR10Symantec Quarantine Server
Upgrade to Quarantine Server from SEP 11.0 MR3 or laterSymantec Quarantine Server
Upgrade to Quarantine Server from SAVCE 10.1 MR10
Vulnerability Identifier
Source
Related Link
- http://symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00
- http://symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_01
- http://www.vupen.com/english/advisories/2011/0234
Share with