[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77982

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-3268

Date: (C)2010-12-22   (M)2017-08-18
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.

Reference:
SECTRACK-1024866
http://www.securityfocus.com/archive/1/archive/1/515191/100/0/threaded
SECUNIA-42593
SECUNIA-43099
BID-45936
ADV-2010-3206
ADV-2011-0234
http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00
symantec-antivirus-handler-service-dos(64028)

CPE    16
cpe:/a:symantec:endpoint_protection:11.0
cpe:/a:symantec:endpoint_protection:11.0.2:mp2
cpe:/a:symantec:endpoint_protection:11.0.4:mp1a
cpe:/a:symantec:endpoint_protection:11.0:ru6a
...
CWE    1
CWE-20

© 2013 SecPod Technologies