10
CVSSv2

CVE-2009-1429

Published: 29/04/2009 Updated: 17/08/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 prior to 9.0 MR7, 10.0 and 10.1 prior to 10.1 MR8, and 10.2 prior to 10.2 MR2; Symantec Client Security (SCS) 2 prior to 2.0 MR7 and 3 prior to 3.1 MR8; and Symantec Endpoint Protection (SEP) prior to 11.0 MR3, allows remote malicious users to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec system center

symantec antivirus -

symantec antivirus 10.0.2.2

symantec antivirus 10.0.2

symantec antivirus 10.0.9

symantec antivirus

symantec client security 3.0.2.2002

symantec client security 3.0.2.2001

symantec client security 3.0.1.1000

symantec client security 3.0.0.359

symantec antivirus central quarantine server

symantec antivirus 10.0.3

symantec antivirus 10.0.4

symantec client security 3.0

symantec client security 3.0.2.2000

symantec client security 3.0.2

symantec endpoint protection

symantec client security 2.0

symantec antivirus 10.0.1

symantec antivirus 10.0.2.1

symantec antivirus 10.0.7

symantec antivirus 10.0.8

symantec client security 3.0.2.2011

symantec client security 3.0.2.2010

symantec client security 3.0.1.1007

symantec client security 3.0.1.1001

symantec antivirus 10.0

symantec antivirus 10.0.1.1

symantec antivirus 10.0.5

symantec antivirus 10.0.6

symantec client security

symantec client security 3.0.2.2021

symantec client security 3.0.2.2020

symantec client security 3.0.1.1009

symantec client security 3.0.1.1008

Exploits

#The AMS2 (Alert Management Systems 2) component of multiple Symantec products is prone to a remote #command-execution vulnerability because the software fails to adequately sanitize user-supplied #input #Successfully exploiting this issue will allow an attacker to execute arbitrary commands with #SYSTEM-level privileges, completely compromising ...
## # $Id: ams_xfrrb 13591 2011-08-19 18:35:29Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit ...