CWE
NVD-CWE-Other 119
Advisory Published
Updated

CVE-2005-3566: Buffer Overflow

First published: Wed Nov 16 2005(Updated: )

Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Symantec Veritas Storage Foundation Cluster File System=4.0_linux
Symantec Veritas Cluster Server=3.5_solaris_mp3
Symantec Veritas Cluster Server=4.0_solaris_mp1
Veritas Storage Foundation and High Availability=3.4_aix
Symantec Veritas Cluster Server=2.2_linux
Symantec Veritas Cluster Server=2.2_mp1
Symantec Veritas Cluster Server=3.5_mp2
Veritas Storage Foundation and High Availability=3.5_solaris
Veritas Storage Foundation and High Availability=2.2_linux
Symantec Veritas Cluster Server=4.0_linux_beta
Veritas Storage Foundation and High Availability=4.0_linux
Symantec Veritas Storage Foundation Cluster File System=4.0_solaris
Symantec Veritas Cluster Server=4.0_solaris
Symantec Veritas Cluster Server=4.0_solaris_beta
Veritas Storage Foundation and High Availability=3.5_hp-ux
Symantec Veritas Cluster Server=3.5_hp-ux
Veritas Storage Foundation and High Availability=3.0_aix
Symantec Veritas Cluster Server=3.5_aix
Veritas Storage Foundation and High Availability=4.0_solaris
Symantec Veritas Storage Foundation Cluster File System=4.0_aix
Symantec Veritas Cluster Server=3.5
Symantec Veritas Sanpoint Control Quickstart=3.5_solaris
Symantec Veritas Cluster Server=3.5_mp1
Symantec Veritas Cluster Server=2.2_mp2
Symantec Veritas Cluster Server=3.5_solaris_mp1
Symantec Veritas Cluster Server=3.5_solaris
Symantec Veritas Cluster Server=3.5_solaris_beta
Symantec Veritas Cluster Server=3.5_mp1j
Symantec Veritas Cluster Server=4.0_aix_beta
Symantec Veritas Cluster Server=3.5_p1
Symantec Veritas Cluster Server=3.5_hp-ux_update_1
Symantec Veritas Cluster Server=3.5_hp-ux_update_2
Symantec Veritas Cluster Server=2.2_linux_mp1p1
Veritas Storage Foundation and High Availability=1.0_aix
Veritas Storage Foundation and High Availability=4.0_aix
Symantec Veritas Cluster Server=4.0_linux
Symantec Veritas Cluster Server=4.0_aix
Symantec Veritas Cluster Server=3.5_solaris_mp2
Symantec Veritas Cluster Server=2.2
Veritas Storage Foundation and High Availability=2.2_vmware_esx

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-3566?

    CVE-2005-3566 is rated as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.

  • How do I fix CVE-2005-3566?

    To mitigate CVE-2005-3566, you should upgrade to the latest version of Symantec Veritas Cluster Server that addresses this buffer overflow issue.

  • Who is affected by CVE-2005-3566?

    CVE-2005-3566 affects local users of various versions of Symantec Veritas Cluster Server and Storage Foundation for UNIX systems.

  • What are the symptoms of CVE-2005-3566?

    Symptoms of CVE-2005-3566 may include unexpected application crashes or unauthorized code execution in the affected systems.

  • Is there a workaround for CVE-2005-3566?

    While the best approach is to apply the patch, limiting access to the affected components can serve as a temporary workaround for CVE-2005-3566.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203