ID CVE-2006-3072
Summary M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted "rule definitions", which produces dangerous Java code during M4 transformation.
References
Vulnerable Configurations
  • cpe:2.3:a:symantec:security_information_manager:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.10:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.10:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.11:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.12:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.12:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.13:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.14:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.14:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.15:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.15:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.16:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.16:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.17:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.17:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.18:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.18:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.19:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.19:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.20:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.20:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.21:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.21:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.22:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.22:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.23:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.23:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.24:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.24:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.25:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.25:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.26:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.26:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.27:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.27:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.28:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.28:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:security_information_manager:4.0.2.29:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:security_information_manager:4.0.2.29:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 20-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 18420
confirm http://securityresponse.symantec.com/avcenter/security/Content/2006.06.13b.html
sectrack 1016296
secunia 20647
vupen ADV-2006-2334
xf symantec-sim-auth-bypass(27105)
Last major update 20-07-2017 - 01:32
Published 19-06-2006 - 10:02
Last modified 20-07-2017 - 01:32
Back to Top