First published: Thu Feb 21 2008(Updated: )
Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Veritas Storage Foundation | =5.0 | |
Symantec Veritas Storage Foundation | =5.0 | |
Symantec Veritas Storage Foundation | =5.0 | |
Symantec Veritas Storage Foundation | =5.0-64bit | |
Symantec Veritas Storage Foundation | =5.0 | |
Symantec Veritas Storage Foundation | =5.0 | |
Symantec Veritas Storage Foundation | =5.0-32bit |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.