First published: Thu Sep 14 2006(Updated: )
Multiple format string vulnerabilities in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allow local users to execute arbitrary code via format strings in (1) Tamper Protection and (2) Virus Alert Notification messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Client Security | =3.0 | |
Symantec Client Security | =1.0.1 | |
Symantec Norton Antivirus with Backup | =9.0.2 | |
Symantec Client Security | =2.0.4 | |
Symantec Norton Antivirus with Backup | =10.0 | |
Symantec Client Security | =1.1.1 | |
Symantec Norton Antivirus with Backup | =9.0.1 | |
Symantec Client Security | =1.1 | |
Symantec Client Security | =2.0 | |
Symantec Client Security | =2.0.3 | |
Symantec Norton Antivirus with Backup | =8.1 | |
Symantec Norton Antivirus with Backup | =9.0 | |
Symantec Client Security | =2.0.2 | |
Symantec Client Security | =2.0.1 | |
Symantec Client Security | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3454 has a high severity due to its potential to allow local users to execute arbitrary code.
To fix CVE-2006-3454, users should upgrade to the latest version of Symantec AntiVirus or Client Security that addresses this vulnerability.
CVE-2006-3454 affects Symantec AntiVirus Corporate Edition versions 8.1 to 10.0 and Symantec Client Security versions 1.x to 3.0.
The consequences of CVE-2006-3454 include the risk of arbitrary code execution, which may lead to unauthorized access or control over the system.
Local users can exploit the vulnerabilities in CVE-2006-3454 by using specially crafted format strings.