CVE-2009-3027 (GCVE-0-2009-3027)
Vulnerability from cvelistv5
Published
2009-12-11 16:00
Modified
2024-08-07 06:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:14:56.480Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "SSRT090253",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/337930.htm"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
},
{
"name": "ADV-2009-3467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3467"
},
{
"name": "37637",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37637"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/337279.htm"
},
{
"name": "37012",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/37012"
},
{
"name": "oval:org.mitre.oval:def:7986",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
},
{
"name": "1023309",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1023309"
},
{
"name": "60884",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/60884"
},
{
"name": "HPSBUX02480",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/337859.htm"
},
{
"name": "1023318",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023318"
},
{
"name": "37685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37685"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/337392.htm"
},
{
"name": "1023312",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1023312"
},
{
"name": "37631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37631"
},
{
"name": "ADV-2009-3483",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3483"
},
{
"name": "1023313",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023313"
},
{
"name": "multiple-symantec-vrtsweb-code-execution(54665)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
},
{
"name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
},
{
"name": "1023311",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1023311"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/337293.htm"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://seer.entsupport.symantec.com/docs/336988.htm"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-12-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "SSRT090253",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/337930.htm"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
},
{
"name": "ADV-2009-3467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3467"
},
{
"name": "37637",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37637"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/337279.htm"
},
{
"name": "37012",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/37012"
},
{
"name": "oval:org.mitre.oval:def:7986",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
},
{
"name": "1023309",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1023309"
},
{
"name": "60884",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/60884"
},
{
"name": "HPSBUX02480",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/337859.htm"
},
{
"name": "1023318",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023318"
},
{
"name": "37685",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37685"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/337392.htm"
},
{
"name": "1023312",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1023312"
},
{
"name": "37631",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37631"
},
{
"name": "ADV-2009-3483",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3483"
},
{
"name": "1023313",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023313"
},
{
"name": "multiple-symantec-vrtsweb-code-execution(54665)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
},
{
"name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
},
{
"name": "1023311",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1023311"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/337293.htm"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://seer.entsupport.symantec.com/docs/336988.htm"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3027",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "SSRT090253",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"name": "http://seer.entsupport.symantec.com/docs/337930.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/337930.htm"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-098/"
},
{
"name": "ADV-2009-3467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3467"
},
{
"name": "37637",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37637"
},
{
"name": "http://seer.entsupport.symantec.com/docs/337279.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/337279.htm"
},
{
"name": "37012",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37012"
},
{
"name": "oval:org.mitre.oval:def:7986",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986"
},
{
"name": "1023309",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023309"
},
{
"name": "60884",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/60884"
},
{
"name": "HPSBUX02480",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2"
},
{
"name": "http://seer.entsupport.symantec.com/docs/337859.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/337859.htm"
},
{
"name": "1023318",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023318"
},
{
"name": "37685",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37685"
},
{
"name": "http://seer.entsupport.symantec.com/docs/337392.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/337392.htm"
},
{
"name": "1023312",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1023312"
},
{
"name": "37631",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37631"
},
{
"name": "ADV-2009-3483",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3483"
},
{
"name": "1023313",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023313"
},
{
"name": "multiple-symantec-vrtsweb-code-execution(54665)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54665"
},
{
"name": "20091209 ZDI-09-098: Symantec Multiple Products VRTSweb.exe Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/508358/100/0/threaded"
},
{
"name": "1023311",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023311"
},
{
"name": "http://seer.entsupport.symantec.com/docs/337293.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/337293.htm"
},
{
"name": "http://seer.entsupport.symantec.com/docs/336988.htm",
"refsource": "CONFIRM",
"url": "http://seer.entsupport.symantec.com/docs/336988.htm"
},
{
"name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00",
"refsource": "CONFIRM",
"url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-3027",
"datePublished": "2009-12-11T16:00:00",
"dateReserved": "2009-08-31T00:00:00",
"dateUpdated": "2024-08-07T06:14:56.480Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-3027\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-11T16:30:00.203\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1, and 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) 3.5; Veritas Storage Foundation for Oracle (SFO) 4.1, 5.0, and 5.0.1; Veritas Storage Foundation for DB2 4.1 and 5.0; Veritas Storage Foundation for Sybase 4.1 and 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Manager (SFM) 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win, and 2.0; Veritas Cluster Server (VCS) 3.5, 4.0, 4.1, and 5.0; Veritas Cluster Server One (VCSOne) 2.0, 2.0.1, and 2.0.2; Veritas Application Director (VAD) 1.1 and 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) 5.1, 5.5, and 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) 3.5, 4.0, 4.1, and 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) 5.0; Veritas Command Central Storage (CCS) 4.x, 5.0, and 5.1; Veritas Command Central Enterprise Reporter (CC-ER) 5.0 GA, 5.0 MP1, 5.0 MP1RP1, and 5.1; Veritas Command Central Storage Change Manager (CC-SCM) 5.0 and 5.1; and Veritas MicroMeasure 5.0 does not properly validate authentication requests, which allows remote attackers to trigger the unpacking of a WAR archive, and execute arbitrary code in the contained files, via crafted data to TCP port 14300.\"},{\"lang\":\"es\",\"value\":\"El archivo VRTSweb.exe en VRTSweb en Backup Exec Continuous Protection Server de Symantec (CPS) versiones 11d, 12.0 y 12.5; Veritas NetBackup Operations Manager (NOM) versiones 6.0 GA hasta 6.5.5; Veritas Backup Reporter (VBR) versiones 6.0 GA hasta 6.6; Veritas Storage Foundation (SF) versi\u00f3n 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) versiones 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5.1 y 5.1AP1; Veritas Storage Foundation for High Availability (SFHA) versi\u00f3n 3.5; Veritas Storage Foundation for Oracle (SFO) versiones 4.1, 5.0 y 5.0.1; Veritas Storage Foundation for DB2 versiones 4.1 y 5.0; Veritas Storage Foundation for Sybase versiones 4.1 y 5.0; Veritas Storage Foundation for Oracle Real Application Cluster (SFRAC) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Manager (SFM) versiones 1.0, 1.0 MP1, 1.1, 1.1.1Ux, 1.1.1Win y 2.0; Veritas Cluster Server (VCS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Cluster Server One (VCSOne) versiones 2.0, 2.0.1 y 2.0.2; Veritas Application Director (VAD) versiones 1.1 y 1.1 Platform Expansion; Veritas Cluster Server Management Console (VCSMC) versiones 5.1, 5.5 y 5.5.1; Veritas Storage Foundation Cluster File System (SFCFS) versiones 3.5, 4.0, 4.1 y 5.0; Veritas Storage Foundation Cluster File System for Oracle RAC (SFCFS RAC) versi\u00f3n 5.0; Veritas Command Central Storage (CCS) versiones 4.x, 5.0 y 5.1; Veritas Command Central Enterprise Reporter (CC-ER) versiones 5.0 GA, 5.0 MP1, 5.0 MP1RP1 y 5.1; Veritas Command Central Storage Change Manager (CC-SCM) versiones 5.0 y 5.1; y Veritas MicroMeasure versi\u00f3n 5.0, no comprueba apropiadamente las peticiones de autenticaci\u00f3n, que permite a los atacantes remotos desencadenar el desempaquetado de un archivo WAR y ejecutar c\u00f3digo arbitrario en los archivos contenidos, por medio de datos dise\u00f1ados al puerto TCP 14300.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:11d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E6E4ABB-057E-42D3-8A89-5D456675EC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D740C486-FBFB-40C3-9984-FDDEC5EA9733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:backup_exec_continuous_protection_server:12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ACB3C3-C9C4-4E9C-A844-D666A967A234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_application_director:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942E06E0-9D27-4CDD-B633-08C327ED1EC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_application_director:1.1:*:platform_expansion:*:*:*:*:*\",\"matchCriteriaId\":\"A9BC62A6-4624-4590-B9C8-0CA16185831C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:11d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012C76D4-E77B-4468-A24A-A492A412CE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA48FE77-E46D-4F12-9124-01165D223CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_backup_exec:12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75D16DC0-92CC-4FAE-8640-4845F6338CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"7B54B477-85EC-4435-BA22-6586DE493097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"B0ED4E24-038C-45DA-8023-233F0A0800F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"37BB09D0-0FD3-41E5-8BE0-890F84B98C89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"D0AACBB1-8F69-4F63-974B-C64E78686438\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"A9EDF286-222D-460B-9591-DB99323BAF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"AB282C2B-C0C5-40CC-9E16-B5B8271AC222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"A7B74077-2547-4F27-BD57-359491435F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"6B271A01-4E72-41DC-A0E6-3F070A7F613C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F586E834-013A-434C-90A1-715B2B15C12D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E89EEBDC-F160-4AB0-80CF-49E5655F04E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1470C394-3B0A-4322-9ACC-A3586527529A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F33C5F-0150-4CA3-94C3-5A84D7715516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_management_console:5.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0886CD94-42FE-4140-86E7-F4C9939A290F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3F7A5C-3944-4DC3-96A6-627B133FA006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB0D6A1-D2D1-4F60-B366-52715D30D26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_cluster_server_one:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D62C7A-3C39-4321-B9E1-49E300EEC494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7C1181-1A78-4774-B016-8D6D5F0C30E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C07F0CC-72FC-4D3F-90AC-D82472422706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.0mp1rp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78FE2945-5381-4445-A064-C9E20B4F643A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_enterprise_reporter:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B30722B-AA42-4B49-BD87-B518C970C921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:4.x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F98C53-8712-4FF6-B168-50F25555CE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33D910F-1116-4432-970B-CD0949CB8DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CC235D3-E8CF-44EE-9C6F-CEE85BA239A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276B6BB8-6E10-4D7C-984D-C9DEC4A93400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_command_central_storage_change_manager:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C2160A2-D8E6-420B-8E3F-90B6501ADCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_micromeasure:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD78EF3-8890-43CB-B56A-6EF18B76E48B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"817AF93A-7BB1-4295-AD5E-67B697DE066F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_operations_manager:6.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79923BD-6346-409B-A326-BDD024D64EA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_reporter:6.0_ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370F7991-4133-4A4A-AF24-232323D0CED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_netbackup_reporter:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024C614A-094B-401B-BF41-9D6071102099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storae_foundation:3.5_onwards:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7C58A-F135-49FE-A507-B46D9FA51232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE415ED-224D-4806-92BB-BEFDE2D645D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"A11DA8A4-DBA8-4F38-9CAC-27BCDD031F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"C7420624-84D9-4A86-A027-6CB288D4B43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"D6652DB1-FDD6-48A4-9517-D981873C4EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"1C96E3F4-F895-41A9-ADA0-97CAEF73AB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"601EC43E-7B41-4BE8-B45B-F33C5B9F9620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"B6C3BEA8-8B10-48AC-BB94-F11E5361315B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"7A2C5349-8569-4884-A8F6-775DAC771D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"68999D92-BF01-48D8-8B1D-078629875F5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E274ECF5-98F2-40D7-8166-63142D0A57F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"A4A976D0-6487-49D4-8556-0DD60021A0CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"8EC6BF09-81D7-4882-BA29-8A311BB673FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F5464913-8A56-4031-93DE-A70F159FF7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"06715E62-1C94-4345-8AA9-D67BB7EB8F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_cluster_file_system_for_oracle_rac:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"D8722C95-F712-4F2A-ACCF-CEA3BEDCCD29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"431F59D5-D26E-4EC9-BABF-E08627D96055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"534552BF-CEF1-45B3-B532-CAD4300F61F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"E047AD78-DE53-4555-B7C2-9FF95EE3D793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"47781640-9536-4107-BF63-80104F947F82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_db2:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A1BE7CE6-7DF3-4C9E-AB4B-3F3534AB6E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_high_availability:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08EF077E-57CB-4995-B465-1DB9DF2B0C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1434B93C-2D93-400E-99E2-95D210771C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F05F046-9B3F-4753-9B94-24906717528B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34053749-395D-48E2-BE02-4784E2D1F934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:3.5:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"C757098D-F666-45F6-B0F8-164170BCED8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"BDE6CD95-FC16-4E12-A852-6F06D3EEA5ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"16F884A4-E0B6-4857-BD61-4B69DA0CF783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"F9496201-BE01-4FFC-A6B9-AED5E8F8C8DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"36B7EF96-CA33-48CF-B6D3-607970BB85DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:4.1:hp-ux:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AA0E4E6-AB87-43D7-BEB9-46B34B5BEDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F339DCEF-1F4F-4C9C-A68D-CA8A5347AD3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"51CCB494-8E39-445C-A9B4-87F1BA42B49B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:hp-ux:*:*:*:*:*\",\"matchCriteriaId\":\"DC2A2F53-7488-4339-B7BE-39CB451CEA07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"2405C7B6-E302-4C56-A4B3-85EE70CE8553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_oracle_real_application_cluster:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"D8726E54-2C92-47E2-82E4-AF987B62C4E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:4.1:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"93186DB0-83C2-45F7-B3D9-129109336C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_sybase:5.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A0A3C285-6FE5-4365-99A9-E8A7689CCBFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:4.3mp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9436C35-7427-40CB-9CAF-4CF0D6BE3DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6555A3-5156-42C6-94F7-7B37F7718AA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55A7A3C7-A461-4838-AA8B-5E4B80E15CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.0rp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B59E2A5-6066-4CEA-A22D-AEA52FDD1419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC35DF8B-6C75-4EAF-B4A4-3C8E5B4CF968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_for_windows_high_availability:5.1ap1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A7773-F8FE-48CA-9CEE-78835E2EF420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE49ED8-BBDE-4B2A-AF89-8C9467232AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.0mp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D0102-15CF-4B99-BA91-5BA852512120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E693F59B-0AA7-413E-B583-E3AD94C18FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1ux:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA02EC8-9C16-4860-96D1-025576DCD53C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:1.1.1win:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9B59DE-9F3B-4AC3-A856-61F66D0531A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:symantec:veritas_storage_foundation_manager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D377C9-EE9C-4F93-BA6D-0994F0E23CE0\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37631\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37637\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37685\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023309\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1023312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seer.entsupport.symantec.com/docs/336988.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337279.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337293.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337392.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337859.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337930.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/60884\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/508358/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37012\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023311\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1023318\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3467\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3483\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-098/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54665\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=126046186917330\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37685\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1023312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seer.entsupport.symantec.com/docs/336988.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337279.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337293.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337392.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337859.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://seer.entsupport.symantec.com/docs/337930.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/60884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/508358/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1023318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2009\u0026suid=20091209_00\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-098/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…