CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.2 | $0-$5k | 0.00 |
A vulnerability classified as problematic has been found in Symantec Client Security 8.1. This affects an unknown part. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allows local users to execute arbitrary code via an unspecified vector related to alert notification messages, a different vector than CVE-2006-3454, a "second format string vulnerability" as found by the vendor.
The weakness was released 09/14/2006 by Deral Heiland (FIRST) with Layered Defense (Website). The advisory is shared at securityresponse.symantec.com. This vulnerability is uniquely identified as CVE-2006-4802 since 09/14/2006. The exploitability is told to be easy. An attack has to be approached locally. No form of authentication is needed for exploitation. Neither technical details nor an exploit are publicly available.
The vulnerability is also documented in the vulnerability database at X-Force (28937). Entry connected to this vulnerability is available at 2537.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.9
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
OpenVAS ID: 57589
OpenVAS Name: Debian Security Advisory DSA 1216-1 (flexbackup)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
09/13/2006 🔍09/13/2006 🔍
09/14/2006 🔍
09/14/2006 🔍
09/14/2006 🔍
09/14/2006 🔍
03/12/2015 🔍
09/24/2017 🔍
Sources
Vendor: symantec.comAdvisory: securityresponse.symantec.com
Researcher: Deral Heiland (FIRST)
Organization: Layered Defense
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-4802 (🔍)
X-Force: 28937 - Symantec Antivirus Corporate and Client Security alert denial of service
SecurityTracker: 1016842 - Symantec Anti Virus Corporate Edition Custom Notification Format String Bug Lets Local Users Gain Elevated Privileges
SecurityFocus: 19986 - Symantec AntiVirus Corporate Edition Multiple Local Format String Vulnerabilities
Secunia: 21884 - Symantec Products Alert Notification Two Vulnerabilities, Less Critical
See also: 🔍
Entry
Created: 03/12/2015 15:51Updated: 09/24/2017 10:15
Changes: 03/12/2015 15:51 (63), 09/24/2017 10:15 (7)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.