var-200610-0005
Vulnerability from variot
The SAVRT.SYS device driver, as used in Symantec AntiVirus Corporate Edition 8.1 and 9.0.x up to 9.0.3, and Symantec Client Security 1.1 and 2.0.x up to 2.0.3, allows local users to execute arbitrary code via a modified address for the output buffer argument to the DeviceIOControl function. Symantec AntiVirus and Symantec Client Security are prone to a privilege-escalation vulnerability. Local attackers can exploit this issue to corrupt memory and execute arbitrary code with kernel-level privileges. Successful exploits may facilitate a complete system compromise.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
The vulnerability is caused due to an improper validation of the output buffer address space of a "DeviceIOControl()" call in the SAVRT.SYS device driver.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Boon Seng Lim.
ORIGINAL ADVISORY: Symantec: http://www.symantec.com/avcenter/security/Content/2006.10.23.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200610-0005", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1.1_build8.1.1.314a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1.1.329" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.2" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_stm_build_9.0.0.338" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.323" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr1_build_8.1.1.314a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1_build393" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr5_build_8.1.1.336" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.3_build_9.0.3.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.434" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr4_build_8.1.1.329" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.2" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.437" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.460" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.1_build_9.0.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.457" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_build_393" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.2_build_9.0.2.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.446" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr3_build_8.1.1.323" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.0.825a" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1_stm_b8.1.0.825a" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.464" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.01.471" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr6_b8.1.1.266" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1.319" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_scf_7.1" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.1.1_mr2_build_8.1.1.319" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.3" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.1.1" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "1.1 and 2.0.x to 2.0.3" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition 8.1 and 9.0.x to 9.0.3" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.446" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.457" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.460" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.434" }, { "model": "client security mr9 build", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "1.1.1393" }, { "model": "antivirus corporate edition mr9", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "client security mr4 build", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.0.41000" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security b8.01.9378", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.0" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.329" }, { "model": "client security b8.01.9374", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.323" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.464" }, { "model": "client security mr8 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.471" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.4" }, { "model": "antivirus corporate edition mr4 build", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "9.0.41000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.434" }, { "model": "client security mr2 b8.01.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "antivirus corporate edition .0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "client security mr1 b8.01.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.437" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.457" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.319" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "client security stm b8.1.0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.471" }, { "model": "client security mr9 b8.01.501", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "client security mr7 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.464" }, { "model": "client security mr6 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.460" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.446" }, { "model": "antivirus corporate edition build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.437" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1393" } ], "sources": [ { "db": "BID", "id": "20684" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "CNNVD", "id": "CNNVD-200610-380" }, { "db": "NVD", "id": "CVE-2006-3455" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002729" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boon Seng Lim", "sources": [ { "db": "CNNVD", "id": "CNNVD-200610-380" } ], "trust": 0.6 }, "cve": "CVE-2006-3455", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.1, "id": "CVE-2006-3455", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.1, "id": "VHN-19563", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-3455", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2006-3455", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200610-380", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-19563", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-19563" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "CNNVD", "id": "CNNVD-200610-380" }, { "db": "NVD", "id": "CVE-2006-3455" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SAVRT.SYS device driver, as used in Symantec AntiVirus Corporate Edition 8.1 and 9.0.x up to 9.0.3, and Symantec Client Security 1.1 and 2.0.x up to 2.0.3, allows local users to execute arbitrary code via a modified address for the output buffer argument to the DeviceIOControl function. Symantec AntiVirus and Symantec Client Security are prone to a privilege-escalation vulnerability. \nLocal attackers can exploit this issue to corrupt memory and execute arbitrary code with kernel-level privileges. Successful exploits may facilitate a complete system compromise. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nThe vulnerability is caused due to an improper validation of the\noutput buffer address space of a \"DeviceIOControl()\" call in the\nSAVRT.SYS device driver. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Boon Seng Lim. \n\nORIGINAL ADVISORY:\nSymantec:\nhttp://www.symantec.com/avcenter/security/Content/2006.10.23.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-3455" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "BID", "id": "20684" }, { "db": "VULHUB", "id": "VHN-19563" }, { "db": "PACKETSTORM", "id": "51254" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-3455", "trust": 2.8 }, { "db": "BID", "id": "20684", "trust": 2.0 }, { "db": "SECUNIA", "id": "22536", "trust": 1.8 }, { "db": "SECTRACK", "id": "1017108", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017109", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-4157", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-002729", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200610-380", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20061023 SYMANTEC PRODUCT SECURITY: SYMANTEC DEVICE DRIVER ELEVATION OF PRIVILEG", "trust": 0.6 }, { "db": "XF", "id": "29762", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-104", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-19563", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "51254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-19563" }, { "db": "BID", "id": "20684" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "PACKETSTORM", "id": "51254" }, { "db": "CNNVD", "id": "CNNVD-200610-380" }, { "db": "NVD", "id": "CVE-2006-3455" } ] }, "id": "VAR-200610-0005", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-19563" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:57:31.945000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM06-022", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2006.10.23.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002729" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-3455" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.symantec.com/avcenter/security/content/2006.10.23.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/20684" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017108" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1017109" }, { "trust": 1.7, "url": "http://secunia.com/advisories/22536" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/449524/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/4157" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29762" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3455" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3455" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/29762" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/449524/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/4157" }, { "trust": 0.3, "url": "http://securityresponse.symantec.com/avcenter/security/content/2006.10.23.html" }, { "trust": 0.3, "url": "http://www.symantec.com/products/enterprise?c=prodinfo\u0026refid=805" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/3549/" }, { "trust": 0.1, "url": "http://secunia.com/product/3478/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/659/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/2344/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/22536/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-19563" }, { "db": "BID", "id": "20684" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "PACKETSTORM", "id": "51254" }, { "db": "CNNVD", "id": "CNNVD-200610-380" }, { "db": "NVD", "id": "CVE-2006-3455" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-19563" }, { "db": "BID", "id": "20684" }, { "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "db": "PACKETSTORM", "id": "51254" }, { "db": "CNNVD", "id": "CNNVD-200610-380" }, { "db": "NVD", "id": "CVE-2006-3455" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-10-23T00:00:00", "db": "VULHUB", "id": "VHN-19563" }, { "date": "2006-10-23T00:00:00", "db": "BID", "id": "20684" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "date": "2006-10-24T18:46:26", "db": "PACKETSTORM", "id": "51254" }, { "date": "2006-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200610-380" }, { "date": "2006-10-23T20:07:00", "db": "NVD", "id": "CVE-2006-3455" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-19563" }, { "date": "2006-10-24T19:28:00", "db": "BID", "id": "20684" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-002729" }, { "date": "2006-10-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200610-380" }, { "date": "2024-11-21T00:13:39.087000", "db": "NVD", "id": "CVE-2006-3455" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "20684" }, { "db": "PACKETSTORM", "id": "51254" }, { "db": "CNNVD", "id": "CNNVD-200610-380" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec AntiVirus Corporate Edition Used in etc. SAVRT.SYS Vulnerability to execute arbitrary code in device driver", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-002729" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "20684" }, { "db": "CNNVD", "id": "CNNVD-200610-380" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.