CVE-2009-1430
Summary
| CVE | CVE-2009-1430 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-04-29 15:30:00 UTC |
| Updated | 2018-10-10 19:36:00 UTC |
| Description | Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Symantec | Antivirus | - | - | srv | All |
| Application | Symantec | Antivirus | 10.0 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.1.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2.2 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.3 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.4 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.5 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.6 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.7 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.8 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.9 | All | corporate | All |
| Application | Symantec | Antivirus | - | - | srv | All |
| Application | Symantec | Antivirus | 10.0 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.1.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2.1 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.2.2 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.3 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.4 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.5 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.6 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.7 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.8 | All | corporate | All |
| Application | Symantec | Antivirus | 10.0.9 | All | corporate | All |
| Application | Symantec | Antivirus | All | All | corporate | All |
| Application | Symantec | Antivirus | All | All | corporate | All |
| Application | Symantec | Antivirus | All | - | corporate | All |
| Application | Symantec | Antivirus Central Quarantine Server | All | All | All | All |
| Application | Symantec | Antivirus Central Quarantine Server | All | All | All | All |
| Application | Symantec | Client Security | 2.0 | All | All | All |
| Application | Symantec | Client Security | 3.0 | All | All | All |
| Application | Symantec | Client Security | 3.0.0.359 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1000 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1001 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1007 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1008 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1009 | All | All | All |
| Application | Symantec | Client Security | 3.0.2 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2000 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2001 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2002 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2010 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2011 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2020 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2021 | All | All | All |
| Application | Symantec | Client Security | 2.0 | All | All | All |
| Application | Symantec | Client Security | 3.0 | All | All | All |
| Application | Symantec | Client Security | 3.0.0.359 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1000 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1001 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1007 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1008 | All | All | All |
| Application | Symantec | Client Security | 3.0.1.1009 | All | All | All |
| Application | Symantec | Client Security | 3.0.2 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2000 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2001 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2002 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2010 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2011 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2020 | All | All | All |
| Application | Symantec | Client Security | 3.0.2.2021 | All | All | All |
| Application | Symantec | Client Security | All | All | All | All |
| Application | Symantec | Endpoint Protection | All | All | All | All |
| Application | Symantec | System Center | All | All | All | All |
| Application | Symantec | System Center | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Symantec Endpoint Protection Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Symantec Client Security Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Multiple Symantec Products Intel Alert Originator Service Multiple Buffer Overflow Vulnerabilities | BID | www.securityfocus.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Multiple Symantec Products Intel Alert Originator Service Stack Overflow Vulnerability | BID | www.securityfocus.com | |
| Security Advisories Relating to Symantec Products - Symantec Alert Management System 2 multiple vulnerabilities - April 28, 2009 | Symantec | CONFIRM | www.symantec.com | |
| Symantec Products Alert Management System 2 Multiple Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| Symantec Anti Virus Corporate Edition Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.