The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.
References
Configurations
History
21 Nov 2024, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36104 - | |
References | () http://secunia.com/advisories/25537 - Vendor Advisory | |
References | () http://seer.entsupport.symantec.com/docs/288627.htm - | |
References | () http://www.securityfocus.com/archive/1/470562/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/24194 - | |
References | () http://www.securitytracker.com/id?1018188 - | |
References | () http://www.symantec.com/avcenter/security/Content/2007.06.01.html - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2007/2035 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34680 - |
Information
Published : 2007-06-04 16:30
Updated : 2025-04-09 00:30
NVD link : CVE-2007-2279
Mitre link : CVE-2007-2279
CVE.ORG link : CVE-2007-2279
JSON object : View
Products Affected
symantec
- veritas_storage_foundation
CWE
CWE-264
Permissions, Privileges, and Access Controls