CVE-2008-3703
Published Aug 18, 2008
Last updated 6 years ago
Overview
- Description
- The management console in the Volume Manager Scheduler Service (aka VxSchedService.exe) in Symantec Veritas Storage Foundation for Windows (SFW) 5.0, 5.0 RP1a, and 5.1 accepts NULL NTLMSSP authentication, which allows remote attackers to execute arbitrary code via requests to the service socket that create "snapshots schedules" registry values specifying future command execution. NOTE: this issue exists because of an incomplete fix for CVE-2007-2279.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation:5.0:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10C7B114-73FB-4294-8E2E-94B5CB63750D" }, { "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation:5.0:rp1a:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C14D03F-1728-4D55-A74C-BD42C6F3007B" }, { "criteria": "cpe:2.3:a:symantec:veritas_storage_foundation:5.1:*:windows:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30E4586D-FB79-49F1-A9DE-A6AB53C1471F" } ], "operator": "OR" } ] } ]