First published: Fri May 16 2014(Updated: )
The server in Symantec Workspace Streaming (SWS) before 7.5.0.749 allows remote attackers to access files and functionality by sending a crafted XMLRPC request over HTTPS.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Workspace Streaming | <=7.5.0 | |
Symantec Workspace Streaming | =6.1 | |
Symantec Workspace Streaming | =6.1-sp1 | |
Symantec Workspace Streaming | =6.1-sp2 | |
Symantec Workspace Streaming | =6.1-sp3 | |
Symantec Workspace Streaming | =6.1-sp4 | |
<=7.5.0 | ||
=6.1 | ||
=6.1-sp1 | ||
=6.1-sp2 | ||
=6.1-sp3 | ||
=6.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1649 is classified as a high severity vulnerability due to its potential for remote exploitation.
To fix CVE-2014-1649, upgrade to Symantec Workspace Streaming version 7.5.0.749 or later.
CVE-2014-1649 affects Symantec Workspace Streaming versions 6.1 and below, including various service packs.
Yes, CVE-2014-1649 can be exploited remotely by sending a crafted XMLRPC request over HTTPS.
By exploiting CVE-2014-1649, an attacker could access unauthorized files and functionalities on the server.