First published: Wed Nov 16 2005(Updated: )
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Veritas Storage Foundation Cluster File System | =4.0_linux | |
Symantec Veritas Cluster Server | =3.5_solaris_mp3 | |
Symantec Veritas Cluster Server | =4.0_solaris_mp1 | |
Veritas Storage Foundation and High Availability | =3.4_aix | |
Symantec Veritas Cluster Server | =2.2_linux | |
Symantec Veritas Cluster Server | =2.2_mp1 | |
Symantec Veritas Cluster Server | =3.5_mp2 | |
Veritas Storage Foundation and High Availability | =3.5_solaris | |
Veritas Storage Foundation and High Availability | =2.2_linux | |
Symantec Veritas Cluster Server | =4.0_linux_beta | |
Veritas Storage Foundation and High Availability | =4.0_linux | |
Symantec Veritas Storage Foundation Cluster File System | =4.0_solaris | |
Symantec Veritas Cluster Server | =4.0_solaris | |
Symantec Veritas Cluster Server | =4.0_solaris_beta | |
Veritas Storage Foundation and High Availability | =3.5_hp-ux | |
Symantec Veritas Cluster Server | =3.5_hp-ux | |
Veritas Storage Foundation and High Availability | =3.0_aix | |
Symantec Veritas Cluster Server | =3.5_aix | |
Veritas Storage Foundation and High Availability | =4.0_solaris | |
Symantec Veritas Storage Foundation Cluster File System | =4.0_aix | |
Symantec Veritas Cluster Server | =3.5 | |
Symantec Veritas Sanpoint Control Quickstart | =3.5_solaris | |
Symantec Veritas Cluster Server | =3.5_mp1 | |
Symantec Veritas Cluster Server | =2.2_mp2 | |
Symantec Veritas Cluster Server | =3.5_solaris_mp1 | |
Symantec Veritas Cluster Server | =3.5_solaris | |
Symantec Veritas Cluster Server | =3.5_solaris_beta | |
Symantec Veritas Cluster Server | =3.5_mp1j | |
Symantec Veritas Cluster Server | =4.0_aix_beta | |
Symantec Veritas Cluster Server | =3.5_p1 | |
Symantec Veritas Cluster Server | =3.5_hp-ux_update_1 | |
Symantec Veritas Cluster Server | =3.5_hp-ux_update_2 | |
Symantec Veritas Cluster Server | =2.2_linux_mp1p1 | |
Veritas Storage Foundation and High Availability | =1.0_aix | |
Veritas Storage Foundation and High Availability | =4.0_aix | |
Symantec Veritas Cluster Server | =4.0_linux | |
Symantec Veritas Cluster Server | =4.0_aix | |
Symantec Veritas Cluster Server | =3.5_solaris_mp2 | |
Symantec Veritas Cluster Server | =2.2 | |
Veritas Storage Foundation and High Availability | =2.2_vmware_esx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3566 is rated as a high severity vulnerability due to its potential to allow local users to execute arbitrary code.
To mitigate CVE-2005-3566, you should upgrade to the latest version of Symantec Veritas Cluster Server that addresses this buffer overflow issue.
CVE-2005-3566 affects local users of various versions of Symantec Veritas Cluster Server and Storage Foundation for UNIX systems.
Symptoms of CVE-2005-3566 may include unexpected application crashes or unauthorized code execution in the affected systems.
While the best approach is to apply the patch, limiting access to the affected components can serve as a temporary workaround for CVE-2005-3566.