First published: Mon Aug 18 2008(Updated: )
The management console in the Volume Manager Scheduler Service (aka VxSchedService.exe) in Symantec Veritas Storage Foundation for Windows (SFW) 5.0, 5.0 RP1a, and 5.1 accepts NULL NTLMSSP authentication, which allows remote attackers to execute arbitrary code via requests to the service socket that create "snapshots schedules" registry values specifying future command execution. NOTE: this issue exists because of an incomplete fix for CVE-2007-2279.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Veritas Storage Foundation and High Availability | =5.0 | |
Veritas Storage Foundation and High Availability | =5.0-rp1a | |
Veritas Storage Foundation and High Availability | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3703 has a medium severity rating due to its potential to allow remote code execution.
To fix CVE-2008-3703, update to the latest version of Symantec Veritas Storage Foundation that addresses this vulnerability.
CVE-2008-3703 affects Symantec Veritas Storage Foundation for Windows versions 5.0, 5.0 RP1a, and 5.1.
CVE-2008-3703 is a remote code execution vulnerability due to improper handling of authentication requests.
Yes, CVE-2008-3703 can be exploited remotely by attackers sending specially crafted requests to the service socket.