10
CVE-2010-0108
- EPSS 13.17%
- Published 19.02.2010 17:30:00
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Buffer overflow in the cliproxy.objects.1 ActiveX control in the Symantec Client Proxy (CLIproxy.dll) in Symantec AntiVirus 10.0.x, 10.1.x before MR9, and 10.2.x before MR4; and Symantec Client Security 3.0.x and 3.1.x before MR9 allows remote attackers to execute arbitrary code via a long argument to the SetRemoteComputerName function.
Data is provided by the National Vulnerability Database (NVD)
Symantec ≫ Client Security Version3.0
Symantec ≫ Client Security Version3.0 Updatemr1
Symantec ≫ Client Security Version3.0 Updatemr2
Symantec ≫ Client Security Version3.0.0.359
Symantec ≫ Client Security Version3.0.1.1000
Symantec ≫ Client Security Version3.0.1.1007
Symantec ≫ Client Security Version3.0.1.1008
Symantec ≫ Client Security Version3.0.2
Symantec ≫ Client Security Version3.0.2.2000
Symantec ≫ Client Security Version3.0.2.2001
Symantec ≫ Client Security Version3.0.2.2010
Symantec ≫ Client Security Version3.0.2.2011
Symantec ≫ Client Security Version3.0.2.2020
Symantec ≫ Client Security Version3.0.2.2021
Symantec ≫ Client Security Version3.1
Symantec ≫ Client Security Version3.1 Updatemr4
Symantec ≫ Client Security Version3.1 Updatemr5
Symantec ≫ Client Security Version3.1 Updatemr7
Symantec ≫ Client Security Version3.1.0.396
Symantec ≫ Client Security Version3.1.0.401
Symantec ≫ Client Security Version3.1.394
Symantec ≫ Client Security Version3.1.400
Symantec ≫ Client Security Version3.1.401
Symantec ≫ Endpoint Protection Version11.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 13.17% | 0.939 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.