First published: Thu Feb 21 2008(Updated: )
Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0-32bit | |
Veritas Storage Foundation and High Availability | =5.0-64bit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0638 is considered a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2008-0638, you should apply any available patches from Symantec for Veritas Storage Foundation 5.0.
CVE-2008-0638 affects Symantec Veritas Storage Foundation 5.0 running on various platforms including AIX, HP-UX, Linux, Solaris, and Windows.
Yes, CVE-2008-0638 can be exploited remotely by sending specially crafted packets to the vulnerable service.
Exploiting CVE-2008-0638 can lead to arbitrary code execution, potentially compromising the affected system.