First published: Wed Dec 22 2010(Updated: )
fw_charts.php in the reporting module in the Manager (aka SEPM) component in Symantec Endpoint Protection (SEP) 11.x before 11 RU6 MP2 allows remote attackers to bypass intended restrictions on report generation, overwrite arbitrary PHP scripts, and execute arbitrary code via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection | =11.0.4-mp1a | |
Symantec Endpoint Protection | =11.0.2 | |
Symantec Endpoint Protection | =11.0.4 | |
Symantec Endpoint Protection | =11.0.4-mp2 | |
Symantec Endpoint Protection | =11.0.1-mp1 | |
Symantec Endpoint Protection | =11.0 | |
Symantec Endpoint Protection | =11.0.2-mp2 | |
Symantec Endpoint Protection | =11.0-ru5 | |
Symantec Endpoint Protection | =11.0-ru6 | |
Symantec Endpoint Protection | =11.0.3001 | |
Symantec Endpoint Protection | =11.0-ru6mp1 | |
Symantec Endpoint Protection | =11.0.2-mp1 | |
Symantec Endpoint Protection | =11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0114 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2010-0114, upgrade Symantec Endpoint Protection to version 11 RU6 MP2 or later.
CVE-2010-0114 can be exploited by remote attackers to bypass report generation restrictions and execute arbitrary code.
CVE-2010-0114 affects Symantec Endpoint Protection versions prior to 11 RU6 MP2, including 11.0.1, 11.0.2, and 11.0.4.
Yes, CVE-2010-0114 is concerning due to its ability to affect multiple versions of a widely used security product.