CVE-2007-1593
Published Jun 4, 2007
Last updated 7 years ago
Overview
- Description
- The administrative service in Symantec Veritas Volume Replicator (VVR) for Windows 3.1 through 4.3, and VVR for Unix 3.5 through 5.0, in Symantec Storage Foundation products allows remote attackers to cause a denial of service (memory consumption and service crash) via a crafted packet to the service port (8199/tcp) that triggers a request for more memory than available, which causes the service to write to an invalid pointer.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:3.1:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F00219E2-7D07-453C-8495-F2BC2BA2996E" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:3.5:*:unix:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B35A994-21E6-4054-B7C0-BEE09C48E10E" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.0:*:unix:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343C262F-5E28-4D3A-9F4F-FF71218E24BB" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:unix:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C48AE2B2-E03A-48E1-B48B-5E8FEE5F637C" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.1:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ECDB104-6836-4EE2-830E-06BE222B2666" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.1:rp1:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BC9AFF0-B574-419F-ADD4-E42102A4B1AD" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.2:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "923C308F-4B57-4966-A1B7-CAFBEB77065D" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp1:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D4CDBDA-22F5-430E-95DC-CBA173AAD78E" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.2:rp2:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28CF2817-461F-4C66-A4B8-8C8D5F2296C5" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.3:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91245A00-98AC-45F5-832F-F61B9DC967C3" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:4.3:mp3:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41B1E100-4557-4B8A-90C6-940FDFD2A187" }, { "criteria": "cpe:2.3:a:symantec:veritas_volume_replicator:5.0:*:unix:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E399AC1E-A782-4BAE-B53D-5E088F8E1086" } ], "operator": "OR" } ] } ]