CVE-2009-1430
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
29/04/2009
Last modified:
09/04/2025
Description
Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:symantec:antivirus:*:-:corporate:*:*:*:*:* | 9.0 (including) | |
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:* | 10.1 (including) | |
cpe:2.3:a:symantec:antivirus:*:*:corporate:*:*:*:*:* | 10.2 (including) | |
cpe:2.3:a:symantec:antivirus:-:-:srv:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:* | ||
cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/34856
- http://www.securityfocus.com/archive/1/503080/100/0/threaded
- http://www.securityfocus.com/bid/34672
- http://www.securityfocus.com/bid/34674
- http://www.securitytracker.com/id?1022130=
- http://www.securitytracker.com/id?1022131=
- http://www.securitytracker.com/id?1022132=
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02
- http://www.vupen.com/english/advisories/2009/1204
- http://www.zerodayinitiative.com/advisories/ZDI-09-018/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50178
- http://secunia.com/advisories/34856
- http://www.securityfocus.com/archive/1/503080/100/0/threaded
- http://www.securityfocus.com/bid/34672
- http://www.securityfocus.com/bid/34674
- http://www.securitytracker.com/id?1022130=
- http://www.securitytracker.com/id?1022131=
- http://www.securitytracker.com/id?1022132=
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02
- http://www.vupen.com/english/advisories/2009/1204
- http://www.zerodayinitiative.com/advisories/ZDI-09-018/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50177
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50178