10
CVE-2009-1429
- EPSS 91.1%
- Published 29.04.2009 15:30:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The Intel LANDesk Common Base Agent (CBA) in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands via a crafted packet whose contents are interpreted as a command to be launched in a new process by the CreateProcessA function.
Data is provided by the National Vulnerability Database (NVD)
Symantec ≫ Client Security Version <= 3.1
Symantec ≫ Client Security Version2.0
Symantec ≫ Client Security Version3.0
Symantec ≫ Client Security Version3.0.0.359
Symantec ≫ Client Security Version3.0.1.1000
Symantec ≫ Client Security Version3.0.1.1001
Symantec ≫ Client Security Version3.0.1.1007
Symantec ≫ Client Security Version3.0.1.1008
Symantec ≫ Client Security Version3.0.1.1009
Symantec ≫ Client Security Version3.0.2
Symantec ≫ Client Security Version3.0.2.2000
Symantec ≫ Client Security Version3.0.2.2001
Symantec ≫ Client Security Version3.0.2.2002
Symantec ≫ Client Security Version3.0.2.2010
Symantec ≫ Client Security Version3.0.2.2011
Symantec ≫ Client Security Version3.0.2.2020
Symantec ≫ Client Security Version3.0.2.2021
Symantec ≫ Endpoint Protection Version <= 11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 91.1% | 0.996 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.