First published: Mon Apr 30 2007(Updated: )
The agent remote upgrade interface in Symantec Enterprise Security Manager (ESM) before 20070405 does not verify the authenticity of upgrades, which allows remote attackers to execute arbitrary code via software that implements the agent upgrade protocol.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Enterprise Security Manager | =6.5.2 | |
Symantec Enterprise Security Manager | =5.5.3 | |
Symantec Enterprise Security Manager | =6.0 | |
Symantec Enterprise Security Manager | =6.5.1 | |
Symantec Enterprise Security Manager | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2375 is considered a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-2375, upgrade Symantec Enterprise Security Manager to version 6.5.3 or later.
CVE-2007-2375 affects versions 5.5.3, 6.0, 6.5, 6.5.1, and 6.5.2 of Symantec Enterprise Security Manager.
CVE-2007-2375 allows remote attackers to execute arbitrary code through unauthenticated agent upgrades.
Yes, CVE-2007-2375 can be exploited by remote attackers over the internet if the affected system is improperly secured.