Multiple stack-based buffer overflow vulnerabilities in Intel Alert Originator Service in Symantec Antivirus, Symantec Client Security and Symantec Endpoint ProtectionID: oval:org.secpod.oval:def:9760 | Date: (C)2013-03-18 (M)2021-11-19 |
Class: VULNERABILITY | Family: windows |
The host is installed with Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier before 9.0 MR7, 10.0 before 10.1 MR8, 10.2 before 10.2 MR2, Symantec Client Security before 2.0 MR7, 3.0 before 3.1 MR8 or Symantec Endpoint Protection before 11.0. MR3 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the applications, which fail to validate data sent to it by the MsgSys.exe process. Successful exploitation could allow attackers to execute arbitrary code.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2016 |
Microsoft Windows 10 |
Microsoft Windows 2000 |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Product: |
Symantec Antivirus |
Symantec Client Security |
Symantec Endpoint Protection |