Korean
<< Back
VID 12095
Severity 40
Port 4888
Protocol TCP
Class Daemon
Detailed Description The Windows host is running a version of Symantec Storage Foundation which is vulnerable to an authentication bypass vulnerability. The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Microsoft Windows 5.0 could allow a remote attacker to bypass authentication and execute arbitrary code on the affected host. By sending specially-crafted requests to the TCP service listening on port 4888, a remote attacker could bypass the built-in authentication in the management console and possibly manipulate the registry with arbitrary commands, which could be executed during regularly scheduled runs.

* References:
http://www.symantec.com/avcenter/security/Content/2007.06.01.html
http://www.securityfocus.com/archive/1/archive/1/470562/100/0/threaded
http://seer.entsupport.symantec.com/docs/288627.htm
http://www.frsirt.com/english/advisories/2007/2035
http://www.securitytracker.com/id?1018188
http://secunia.com/advisories/25537

* Platforms Affected:
Symantec Veritas Storage Foundation 5.0
Microsoft Windows Any version
Recommendation Apply the appropriate patch for this vulnerability, as listed in Symantec Security Bulletin SYM07-009 at http://www.symantec.com/avcenter/security/Content/2007.06.01.html
Related URL CVE-2007-2279 (CVE)
Related URL 24194 (SecurityFocus)
Related URL 34680 (ISS)