CVE-2009-3027 (GCVE-0-2009-3027)
Vulnerability from cvelistv5
Published
2009-12-11 16:00
Modified
2024-08-07 06:14
Severity ?
CWE
  • n/a
Summary
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.
References
cve@mitre.org http://marc.info/?l=bugtraq&m=126046186917330&w=2 Patch
cve@mitre.org http://marc.info/?l=bugtraq&m=126046186917330&w=2 Patch
cve@mitre.org http://secunia.com/advisories/37631 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/37637 Vendor Advisory
cve@mitre.org http://secunia.com/advisories/37685 Vendor Advisory
cve@mitre.org http://securitytracker.com/id?1023309
cve@mitre.org http://securitytracker.com/id?1023312
cve@mitre.org http://seer.entsupport.symantec.com/docs/336988.htm Patch, Vendor Advisory
cve@mitre.org http://seer.entsupport.symantec.com/docs/337279.htm Patch, Vendor Advisory
cve@mitre.org http://seer.entsupport.symantec.com/docs/337293.htm Patch, Vendor Advisory
cve@mitre.org http://seer.entsupport.symantec.com/docs/337392.htm Patch, Vendor Advisory
cve@mitre.org http://seer.entsupport.symantec.com/docs/337859.htm Patch, Vendor Advisory
cve@mitre.org http://seer.entsupport.symantec.com/docs/337930.htm Patch, Vendor Advisory
cve@mitre.org http://www.osvdb.org/60884
cve@mitre.org http://www.securityfocus.com/archive/1/508358/100/0/threaded
cve@mitre.org http://www.securityfocus.com/bid/37012
cve@mitre.org http://www.securitytracker.com/id?1023311
cve@mitre.org http://www.securitytracker.com/id?1023313
cve@mitre.org http://www.securitytracker.com/id?1023318
cve@mitre.org http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
cve@mitre.org http://www.vupen.com/english/advisories/2009/3467 Vendor Advisory
cve@mitre.org http://www.vupen.com/english/advisories/2009/3483 Vendor Advisory
cve@mitre.org http://www.zerodayinitiative.com/advisories/ZDI-09-098/ Patch
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/54665
cve@mitre.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986
af854a3a-2127-422b-91ae-364da2661108 http://marc.info/?l=bugtraq&m=126046186917330&w=2 Patch
af854a3a-2127-422b-91ae-364da2661108 http://marc.info/?l=bugtraq&m=126046186917330&w=2 Patch
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/37631 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/37637 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://secunia.com/advisories/37685 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1023309
af854a3a-2127-422b-91ae-364da2661108 http://securitytracker.com/id?1023312
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/336988.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/337279.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/337293.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/337392.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/337859.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://seer.entsupport.symantec.com/docs/337930.htm Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.osvdb.org/60884
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/508358/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/37012
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id?1023311
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id?1023313
af854a3a-2127-422b-91ae-364da2661108 http://www.securitytracker.com/id?1023318
af854a3a-2127-422b-91ae-364da2661108 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091209_00
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2009/3467 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.vupen.com/english/advisories/2009/3483 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.zerodayinitiative.com/advisories/ZDI-09-098/ Patch
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/54665
af854a3a-2127-422b-91ae-364da2661108 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:14:56.480Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SSRT090253",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
          },
          {
            "name": "ADV-2009-3467",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3467"
          },
          {
            "name": "37637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37637"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
          },
          {
            "name": "37012",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37012"
          },
          {
            "name": "oval:org.mitre.oval:def:7986",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
          },
          {
            "name": "1023309",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023309"
          },
          {
            "name": "60884",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/60884"
          },
          {
            "name": "HPSBUX02480",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
          },
          {
            "name": "1023318",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023318"
          },
          {
            "name": "37685",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
          },
          {
            "name": "1023312",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023312"
          },
          {
            "name": "37631",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37631"
          },
          {
            "name": "ADV-2009-3483",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3483"
          },
          {
            "name": "1023313",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023313"
          },
          {
            "name": "multiple-symantec-vrtsweb-code-execution(54665)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
          },
          {
            "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
          },
          {
            "name": "1023311",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1023311"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SSRT090253",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
        },
        {
          "name": "ADV-2009-3467",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3467"
        },
        {
          "name": "37637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37637"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
        },
        {
          "name": "37012",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37012"
        },
        {
          "name": "oval:org.mitre.oval:def:7986",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
        },
        {
          "name": "1023309",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023309"
        },
        {
          "name": "60884",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/60884"
        },
        {
          "name": "HPSBUX02480",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
        },
        {
          "name": "1023318",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023318"
        },
        {
          "name": "37685",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
        },
        {
          "name": "1023312",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023312"
        },
        {
          "name": "37631",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37631"
        },
        {
          "name": "ADV-2009-3483",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3483"
        },
        {
          "name": "1023313",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023313"
        },
        {
          "name": "multiple-symantec-vrtsweb-code-execution(54665)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
        },
        {
          "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
        },
        {
          "name": "1023311",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1023311"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SSRT090253",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337930.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337930.htm"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
            },
            {
              "name": "ADV-2009-3467",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3467"
            },
            {
              "name": "37637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37637"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337279.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337279.htm"
            },
            {
              "name": "37012",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37012"
            },
            {
              "name": "oval:org.mitre.oval:def:7986",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
            },
            {
              "name": "1023309",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023309"
            },
            {
              "name": "60884",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/60884"
            },
            {
              "name": "HPSBUX02480",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337859.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337859.htm"
            },
            {
              "name": "1023318",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023318"
            },
            {
              "name": "37685",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37685"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337392.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337392.htm"
            },
            {
              "name": "1023312",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023312"
            },
            {
              "name": "37631",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37631"
            },
            {
              "name": "ADV-2009-3483",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3483"
            },
            {
              "name": "1023313",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023313"
            },
            {
              "name": "multiple-symantec-vrtsweb-code-execution(54665)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
            },
            {
              "name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
            },
            {
              "name": "1023311",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1023311"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/337293.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/337293.htm"
            },
            {
              "name": "http://seer.entsupport.symantec.com/docs/336988.htm",
              "refsource": "CONFIRM",
              "url": "http://seer.entsupport.symantec.com/docs/336988.htm"
            },
            {
              "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00",
              "refsource": "CONFIRM",
              "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3027",
    "datePublished": "2009-12-11T16:00:00",
    "dateReserved": "2009-08-31T00:00:00",
    "dateUpdated": "2024-08-07T06:14:56.480Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3027\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-11T16:30:00.203\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.\"},{\"lang\":\"es\",\"value\":\"El archivo VRTSweb.exe en VRTSweb en Backup Exec Continuous Protection Server de Symantec (CPS) versiones 11d, 12.0 y 12.5; Veritas NetBackup Operations Manager (NOM) versiones 6.0 GA hasta 6.5.5; Veritas Backup Reporter (VBR) versiones 6.0 GA hasta 6.6; Veritas Storage Foundation (SF) versi\u00f3n 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) versiones 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1 y 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) versi\u00f3n 3.5; Veritas Storage Foundation for Oracle (SFO) versiones 4.1, 5.0 y 5.0.1; Veritas Storage Foundation for DB2 versiones 4.1 y 5.0; Veritas Storage Foundation for Sybase versiones 4.1 y 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Manager (SFM) versiones 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win y 2.0; Veritas Cluster Server (VCS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Cluster Server One (VCSOne) versiones 2.0, 2.0.1 y 2.0.2; Veritas Application Director (VAD) versiones 1.1 y 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) versiones 5.1, 5.5 y 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) versi\u00f3n 5.0; Veritas Command Central Storage (CCS) versiones 4.x, 5.0 y 5.1; Veritas Command Central Enterprise Reporter (CC-ER) versiones 5.0 GA, 5.0 MP1, 5.0 MP1RP1 y 5.1; Veritas Command Central Storage Change Manager (CC-SCM) versiones 5.0 y 5.1; y Veritas MicroMeasure versi\u00f3n 5.0, no comprueba apropiadamente las peticiones de autenticaci\u00f3n, que permite a los atacantes remotos desencadenar el desempaquetado de un archivo WAR y ejecutar c\u00f3digo arbitrario en los archivos contenidos, por medio de datos dise\u00f1ados al puerto TCP 14300.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:11d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6E4ABB-057E-42D3-8A89-5D456675EC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D740C486-FBFB-40C3-9984-FDDEC5EA9733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ACB3C3-C9C4-4E9C-A844-D666A967A234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_application_director:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942E06E0-9D27-4CDD-B633-08C327ED1EC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_application_director:1.1:*:platform_expansion:*:*:*:*:*\",\"matchCriteriaId\":\"A9BC62A6-4624-4590-B9C8-0CA16185831C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:11d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012C76D4-E77B-4468-A24A-A492A412CE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA48FE77-E46D-4F12-9124-01165D223CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D16DC0-92CC-4FAE-8640-4845F6338CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"7B54B477-85EC-4435-BA22-6586DE493097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"B0ED4E24-038C-45DA-8023-233F0A0800F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"37BB09D0-0FD3-41E5-8BE0-890F84B98C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"D0AACBB1-8F69-4F63-974B-C64E78686438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"A9EDF286-222D-460B-9591-DB99323BAF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"AB282C2B-C0C5-40CC-9E16-B5B8271AC222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"A7B74077-2547-4F27-BD57-359491435F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"6B271A01-4E72-41DC-A0E6-3F070A7F613C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F586E834-013A-434C-90A1-715B2B15C12D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E89EEBDC-F160-4AB0-80CF-49E5655F04E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1470C394-3B0A-4322-9ACC-A3586527529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F33C5F-0150-4CA3-94C3-5A84D7715516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0886CD94-42FE-4140-86E7-F4C9939A290F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3F7A5C-3944-4DC3-96A6-627B133FA006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB0D6A1-D2D1-4F60-B366-52715D30D26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D62C7A-3C39-4321-B9E1-49E300EEC494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7C1181-1A78-4774-B016-8D6D5F0C30E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C07F0CC-72FC-4D3F-90AC-D82472422706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1rp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78FE2945-5381-4445-A064-C9E20B4F643A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B30722B-AA42-4B49-BD87-B518C970C921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:4.x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F98C53-8712-4FF6-B168-50F25555CE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33D910F-1116-4432-970B-CD0949CB8DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC235D3-E8CF-44EE-9C6F-CEE85BA239A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276B6BB8-6E10-4D7C-984D-C9DEC4A93400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C2160A2-D8E6-420B-8E3F-90B6501ADCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_micromeasure:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD78EF3-8890-43CB-B56A-6EF18B76E48B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"817AF93A-7BB1-4295-AD5E-67B697DE066F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79923BD-6346-409B-A326-BDD024D64EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_reporter:6.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370F7991-4133-4A4A-AF24-232323D0CED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_reporter:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024C614A-094B-401B-BF41-9D6071102099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storae_foundation:3.5_onwards:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7C58A-F135-49FE-A507-B46D9FA51232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE415ED-224D-4806-92BB-BEFDE2D645D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"A11DA8A4-DBA8-4F38-9CAC-27BCDD031F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"C7420624-84D9-4A86-A027-6CB288D4B43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"D6652DB1-FDD6-48A4-9517-D981873C4EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"1C96E3F4-F895-41A9-ADA0-97CAEF73AB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"601EC43E-7B41-4BE8-B45B-F33C5B9F9620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"B6C3BEA8-8B10-48AC-BB94-F11E5361315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"7A2C5349-8569-4884-A8F6-775DAC771D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"68999D92-BF01-48D8-8B1D-078629875F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E274ECF5-98F2-40D7-8166-63142D0A57F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"A4A976D0-6487-49D4-8556-0DD60021A0CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"8EC6BF09-81D7-4882-BA29-8A311BB673FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F5464913-8A56-4031-93DE-A70F159FF7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"06715E62-1C94-4345-8AA9-D67BB7EB8F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system_for_oracle_rac:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"D8722C95-F712-4F2A-ACCF-CEA3BEDCCD29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"431F59D5-D26E-4EC9-BABF-E08627D96055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"534552BF-CEF1-45B3-B532-CAD4300F61F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E047AD78-DE53-4555-B7C2-9FF95EE3D793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"47781640-9536-4107-BF63-80104F947F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A1BE7CE6-7DF3-4C9E-AB4B-3F3534AB6E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_high_availability:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08EF077E-57CB-4995-B465-1DB9DF2B0C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1434B93C-2D93-400E-99E2-95D210771C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F05F046-9B3F-4753-9B94-24906717528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34053749-395D-48E2-BE02-4784E2D1F934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"C757098D-F666-45F6-B0F8-164170BCED8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"BDE6CD95-FC16-4E12-A852-6F06D3EEA5ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"16F884A4-E0B6-4857-BD61-4B69DA0CF783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F9496201-BE01-4FFC-A6B9-AED5E8F8C8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"36B7EF96-CA33-48CF-B6D3-607970BB85DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:hp-ux:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA0E4E6-AB87-43D7-BEB9-46B34B5BEDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F339DCEF-1F4F-4C9C-A68D-CA8A5347AD3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"51CCB494-8E39-445C-A9B4-87F1BA42B49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"DC2A2F53-7488-4339-B7BE-39CB451CEA07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"2405C7B6-E302-4C56-A4B3-85EE70CE8553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"D8726E54-2C92-47E2-82E4-AF987B62C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"93186DB0-83C2-45F7-B3D9-129109336C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A0A3C285-6FE5-4365-99A9-E8A7689CCBFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:4.3mp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9436C35-7427-40CB-9CAF-4CF0D6BE3DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6555A3-5156-42C6-94F7-7B37F7718AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A7A3C7-A461-4838-AA8B-5E4B80E15CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B59E2A5-6066-4CEA-A22D-AEA52FDD1419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC35DF8B-6C75-4EAF-B4A4-3C8E5B4CF968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1ap1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A7773-F8FE-48CA-9CEE-78835E2EF420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE49ED8-BBDE-4B2A-AF89-8C9467232AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0mp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D0102-15CF-4B99-BA91-5BA852512120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E693F59B-0AA7-413E-B583-E3AD94C18FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1ux:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA02EC8-9C16-4860-96D1-025576DCD53C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1win:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9B59DE-9F3B-4AC3-A856-61F66D0531A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D377C9-EE9C-4F93-BA6D-0994F0E23CE0\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37637\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37685\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023309\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seer.entsupport.symantec.com/docs/336988.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337279.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337293.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337392.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337859.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337930.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/60884\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/508358/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37012\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023311\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023318\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3467\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3483\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-098/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54665\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seer.entsupport.symantec.com/docs/336988.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337279.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337293.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337392.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337859.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337930.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/60884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/508358/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-098/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…