First published: Wed Jan 25 2012(Updated: )
The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec pcAnywhere | =12.5 | |
Symantec pcAnywhere | =12.6.7580 | |
Symantec pcAnywhere | =12.6.65-sp1 | |
Symantec pcAnywhere | =12.5-sp3 | |
Symantec pcAnywhere | =12.6.65 | |
Symantec pcAnywhere | =12.5-sp1 | |
Symantec pcAnywhere | =12.5-sp2 | |
Symantec pcAnywhere | =12.5.539 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.