First published: Wed Jan 25 2012(Updated: )
The host-services component in Symantec pcAnywhere 12.5.x through 12.5.3, and IT Management Suite pcAnywhere Solution 7.0 (aka 12.5.x) and 7.1 (aka 12.6.x), does not properly filter login and authentication data, which allows remote attackers to execute arbitrary code via a crafted session on TCP port 5631.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec pcAnywhere | =12.5 | |
Symantec pcAnywhere | =12.6.7580 | |
Symantec pcAnywhere | =12.6.65-sp1 | |
Symantec pcAnywhere | =12.5-sp3 | |
Symantec pcAnywhere | =12.6.65 | |
Symantec pcAnywhere | =12.5-sp1 | |
Symantec pcAnywhere | =12.5-sp2 | |
Symantec pcAnywhere | =12.5.539 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3478 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2011-3478, upgrade to the latest version of Symantec pcAnywhere that addresses this vulnerability.
CVE-2011-3478 affects Symantec pcAnywhere versions 12.5.x through 12.5.3 and 12.6.x up to version 12.6.7580.
CVE-2011-3478 can be exploited by remote attackers sending crafted login and authentication data.
While patching is the preferred solution for CVE-2011-3478, temporary measures may include disabling remote access or restricting access to trusted networks.