First published: Thu Apr 30 2009(Updated: )
Symantec Reporting Server, as used in Symantec AntiVirus (SAV) Corporate Edition 10.1 before 10.1 MR8 and 10.2 before 10.2 MR2, Symantec Client Security (SCS) before 3.1 MR8, and the Symantec Endpoint Protection Manager (SEPM) component in Symantec Endpoint Protection (SEP) before 11.0 MR2, allows remote attackers to inject arbitrary text into the login screen, and possibly conduct phishing attacks, via vectors involving a URL that is not properly handled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Antivirus | =10.1 | |
Symantec Antivirus | =10.1-maintenance_release7 | |
Symantec Antivirus | =10.2 | |
Symantec Antivirus | =10.2-maintenance_release1 | |
Symantec Client Security | =3.1 | |
Symantec Client Security | =3.1-maintenance_release7 | |
Symantec Endpoint Protection | =11.0 | |
Symantec Endpoint Protection | =11.0-maintenance_release1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1432 is considered a moderate severity vulnerability.
To fix CVE-2009-1432, update your Symantec Reporting Server to the recommended version as specified in the security advisories.
CVE-2009-1432 affects Symantec AntiVirus Corporate Edition 10.1 and 10.2, Symantec Client Security 3.1, and Symantec Endpoint Protection Manager before specific maintenance releases.
CVE-2009-1432 is a security vulnerability that allows unauthorized access to sensitive data.
CVE-2009-1432 was published in June 2009.