10
CVSSv2

CVE-2010-0108

Published: 19/02/2010 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the cliproxy.objects.1 ActiveX control in the Symantec Client Proxy (CLIproxy.dll) in Symantec AntiVirus 10.0.x, 10.1.x before MR9, and 10.2.x before MR4; and Symantec Client Security 3.0.x and 3.1.x before MR9 allows remote malicious users to execute arbitrary code via a long argument to the SetRemoteComputerName function.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec antivirus 10.0

symantec antivirus 10.0.1

symantec antivirus 10.0.5

symantec antivirus 10.0.6

symantec antivirus 10.1.5.1

symantec antivirus 10.1.5

symantec antivirus 10.1

symantec client security 3.0.1.1008

symantec client security 3.0.2

symantec client security 3.0.2.2000

symantec client security 3.0

symantec client security 3.1

symantec antivirus 10.0.1.1

symantec antivirus 10.0.2

symantec antivirus 10.0.7

symantec antivirus 10.0.8

symantec antivirus 10.0.9

symantec antivirus 10.1.6.1

symantec antivirus 10.1.6

symantec antivirus 10.2

symantec client security 3.0.2.2001

symantec client security 3.0.2.2010

symantec client security 3.1.0.396

symantec client security 3.1.0.401

symantec endpoint protection 11.0

symantec antivirus 10.0.3

symantec antivirus 10.0.4

symantec antivirus 10.1.4.1

symantec antivirus 10.1.4

symantec client security 3.0.1.1000

symantec client security 3.0.1.1007

symantec client security 3.0.2.2021

symantec client security 3.1.401

symantec antivirus 10.0.2.1

symantec antivirus 10.0.2.2

symantec antivirus 10.1.0.1

symantec antivirus 10.1.7

symantec client security 3.0.0.359

symantec client security 3.0.2.2011

symantec client security 3.0.2.2020

symantec client security 3.1.394

symantec client security 3.1.400

Exploits

source: wwwsecurityfocuscom/bid/38222/info The Symantec Client Proxy ActiveX control is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data Successful exploits allow remote attackers to execute arbitrary code in the context of the application using the ActiveX ...