var-200706-0313
Vulnerability from variot
Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to "disable the authentication system" and bypass authentication via unknown vectors. Symantec Reporting Server Is " The authentication system is disabled " There are vulnerabilities that prevent authentication.By the attacker, " The authentication system is disabled " , And authentication could be bypassed. Symantec Reporting Server is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to gain access to the reporting database
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200706-0313", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.401" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.396" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.394" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.1.401" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.1.400" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.1.396" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.1.400" }, { "model": "reporting server", "scope": "lte", "trust": 1.0, "vendor": "symantec", "version": "1.0.197.0" }, { "model": "reporting server", "scope": "eq", "trust": 0.9, "vendor": "symantec", "version": "1.0.197.0" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "3.1 and later" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition (sav ce) 10.1 and later" }, { "model": "reporting server", "scope": "lt", "trust": 0.8, "vendor": "symantec", "version": "1.0.197.0 and 1.0.224.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.401" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.400" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.396" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.394" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "reporting server", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "1.0.224.0" }, { "model": "client security", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "3.1.6.6000" }, { "model": "antivirus corporate edition", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.600" } ], "sources": [ { "db": "BID", "id": "24325" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "CNNVD", "id": "CNNVD-200706-080" }, { "db": "NVD", "id": "CVE-2007-3095" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:reporting_server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005648" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec", "sources": [ { "db": "CNNVD", "id": "CNNVD-200706-080" } ], "trust": 0.6 }, "cve": "CVE-2007-3095", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2007-3095", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-26457", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-3095", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2007-3095", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200706-080", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-26457", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-26457" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "CNNVD", "id": "CNNVD-200706-080" }, { "db": "NVD", "id": "CVE-2007-3095" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, allows attackers to \"disable the authentication system\" and bypass authentication via unknown vectors. Symantec Reporting Server Is \" The authentication system is disabled \" There are vulnerabilities that prevent authentication.By the attacker, \" The authentication system is disabled \" , And authentication could be bypassed. Symantec Reporting Server is prone to an authentication-bypass vulnerability. \nAn attacker can exploit this issue to gain access to the reporting database", "sources": [ { "db": "NVD", "id": "CVE-2007-3095" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "BID", "id": "24325" }, { "db": "VULHUB", "id": "VHN-26457" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-3095", "trust": 2.8 }, { "db": "BID", "id": "24325", "trust": 2.0 }, { "db": "SECTRACK", "id": "1018196", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-2074", "trust": 1.7 }, { "db": "SECUNIA", "id": "25543", "trust": 1.7 }, { "db": "OSVDB", "id": "36107", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-005648", "trust": 0.8 }, { "db": "XF", "id": "34895", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200706-080", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-26457", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-26457" }, { "db": "BID", "id": "24325" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "CNNVD", "id": "CNNVD-200706-080" }, { "db": "NVD", "id": "CVE-2007-3095" } ] }, "id": "VAR-200706-0313", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-26457" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:36:13.767000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM07-011", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2007.06.05.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005648" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-3095" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.symantec.com/avcenter/security/content/2007.06.05.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/24325" }, { "trust": 1.7, "url": "http://osvdb.org/36107" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1018196" }, { "trust": 1.7, "url": "http://secunia.com/advisories/25543" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/2074" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34895" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3095" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3095" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/34895" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/2074" }, { "trust": 0.3, "url": "http://www.symantec.com/smb/products/overview.jsp?pcid=end_sec\u0026pvid=scs31" }, { "trust": 0.3, "url": "http://www.symantec.com/enterprise/products/sysreq.jsp?pcid=1322\u0026pvid=805_1" }, { "trust": 0.3, "url": "/archive/1/470606" } ], "sources": [ { "db": "VULHUB", "id": "VHN-26457" }, { "db": "BID", "id": "24325" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "CNNVD", "id": "CNNVD-200706-080" }, { "db": "NVD", "id": "CVE-2007-3095" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-26457" }, { "db": "BID", "id": "24325" }, { "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "db": "CNNVD", "id": "CNNVD-200706-080" }, { "db": "NVD", "id": "CVE-2007-3095" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-06-06T00:00:00", "db": "VULHUB", "id": "VHN-26457" }, { "date": "2007-06-05T00:00:00", "db": "BID", "id": "24325" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "date": "2007-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200706-080" }, { "date": "2007-06-06T22:30:00", "db": "NVD", "id": "CVE-2007-3095" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-26457" }, { "date": "2015-05-07T17:37:00", "db": "BID", "id": "24325" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005648" }, { "date": "2007-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200706-080" }, { "date": "2024-11-21T00:32:23.850000", "db": "NVD", "id": "CVE-2007-3095" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200706-080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Client Security and SAV CE Used in etc. Symantec Reporting Server In \" The authentication system is disabled \" Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005648" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "24325" }, { "db": "CNNVD", "id": "CNNVD-200706-080" } ], "trust": 0.9 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…