First published: Mon Jun 04 2007(Updated: )
The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas Storage Foundation and High Availability | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2279 has a high severity rating due to the potential for remote code execution.
To fix CVE-2007-2279, ensure that you update Symantec Storage Foundation for Windows to the latest version.
CVE-2007-2279 exploits the Scheduler Service in Symantec Storage Foundation, allowing unauthorized code execution.
Veritas Storage Foundation version 5.0 for Windows is affected by CVE-2007-2279.
Yes, CVE-2007-2279 can be exploited remotely due to insufficient authentication in the Scheduler Service.