VID |
12095 |
Severity |
40 |
Port |
4888 |
Protocol |
TCP |
Class |
Daemon |
Detailed Description |
The Windows host is running a version of Symantec Storage Foundation which is vulnerable to an authentication bypass vulnerability. The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Microsoft Windows 5.0 could allow a remote attacker to bypass authentication and execute arbitrary code on the affected host. By sending specially-crafted requests to the TCP service listening on port 4888, a remote attacker could bypass the built-in authentication in the management console and possibly manipulate the registry with arbitrary commands, which could be executed during regularly scheduled runs.
* References: http://www.symantec.com/avcenter/security/Content/2007.06.01.html http://www.securityfocus.com/archive/1/archive/1/470562/100/0/threaded http://seer.entsupport.symantec.com/docs/288627.htm http://www.frsirt.com/english/advisories/2007/2035 http://www.securitytracker.com/id?1018188 http://secunia.com/advisories/25537
* Platforms Affected: Symantec Veritas Storage Foundation 5.0 Microsoft Windows Any version |
Recommendation |
Apply the appropriate patch for this vulnerability, as listed in Symantec Security Bulletin SYM07-009 at http://www.symantec.com/avcenter/security/Content/2007.06.01.html |
Related URL |
CVE-2007-2279 (CVE) |
Related URL |
24194 (SecurityFocus) |
Related URL |
34680 (ISS) |
|