cpe:/a:intel:intel_alert_management_system cpe:/a:symantec:antivirus:10.1.4.4010::corporate cpe:/a:symantec:endpoint_protection:11.0 cpe:/a:symantec:endpoint_protection:11.0:rtm cpe:/a:symantec:endpoint_protection:11.0:ru5 cpe:/a:symantec:endpoint_protection:11.0:ru6 cpe:/a:symantec:endpoint_protection:11.0:ru6a cpe:/a:symantec:endpoint_protection:11.0:ru6mp1 cpe:/a:symantec:endpoint_protection:11.0:ru6mp2 cpe:/a:symantec:endpoint_protection:11.0.1 cpe:/a:symantec:endpoint_protection:11.0.1:mp1 cpe:/a:symantec:endpoint_protection:11.0.1:mp2 cpe:/a:symantec:endpoint_protection:11.0.2 cpe:/a:symantec:endpoint_protection:11.0.2:mp1 cpe:/a:symantec:endpoint_protection:11.0.2:mp2 cpe:/a:symantec:endpoint_protection:11.0.4 cpe:/a:symantec:endpoint_protection:11.0.4:mp1a cpe:/a:symantec:endpoint_protection:11.0.4:mp2 cpe:/a:symantec:endpoint_protection:11.0.3001 CVE-2010-3268 2010-12-22T16:00:15.723-05:00 2017-08-16T21:32:56.430-04:00 5.0 NETWORK LOW NONE NONE NONE PARTIAL http://nvd.nist.gov 2010-12-23T08:25:00.000-05:00 SECTRACK 1024866 BUGTRAQ 20101213 [CORE-2010-0728] Symantec Intel Handler Service Remote Denial-of-Service SECUNIA 42593 SECUNIA 43099 BID 45936 VUPEN ADV-2010-3206 VUPEN ADV-2011-0234 MISC http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos CONFIRM http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00 CONFIRM http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00 XF symantec-antivirus-handler-service-dos(64028) The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.