CVE-2010-3268
Summary
| CVE | CVE-2010-3268 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-12-22 21:00:00 UTC |
| Updated | 2018-10-30 16:25:00 UTC |
| Description | The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Intel | Intel Alert Management System | All | All | All | All |
| Application | Intel | Intel Alert Management System | All | All | All | All |
| Operating System | Microsoft | Windows 2000 | - | sp4 | All | All |
| Operating System | Microsoft | Windows 2000 | - | sp4 | All | All |
| Application | Symantec | Antivirus | 10.1.4.4010 | All | corporate | All |
| Application | Symantec | Antivirus | 10.1.4.4010 | All | corporate | All |
| Application | Symantec | Endpoint Protection | 11.0 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | rtm | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru5 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6a | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.3001 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | mp1a | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | rtm | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru5 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6a | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0 | ru6mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.1 | mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | mp1 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.2 | mp2 | All | All |
| Application | Symantec | Endpoint Protection | 11.0.3001 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | All | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | mp1a | All | All |
| Application | Symantec | Endpoint Protection | 11.0.4 | mp2 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Symantec Antivirus Corporate Edition Input Validation Flaw in Intel Handler Service Lets Remote Users Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | |
| About Secunia Research | Flexera | SECUNIA | secunia.com | Vendor Advisory |
| 45936 | BID | www.securityfocus.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Core Security Technologies | MISC | www.coresecurity.com | Exploit |
| Symantec Products Intel Alert Management System Multiple Vulnerabilities - Advisories - Community | SECUNIA | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Vendor Advisory |
| Security Advisories Relating to Symantec Products - Symantec Intel Alert Management System Multiple Code Execution Issues - 2011-01-26T09:22:13 PST | Symantec | CONFIRM | www.symantec.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.