Lucene search

K
cve[email protected]CVE-2010-0108
HistoryFeb 19, 2010 - 5:30 p.m.

CVE-2010-0108

2010-02-1917:30:00
CWE-119
web.nvd.nist.gov
27
cve-2010-0108
buffer overflow
symantec
remote code execution
cliproxy.dll
activex
nvd
vulnerability

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.9 High

AI Score

Confidence

Low

0.645 Medium

EPSS

Percentile

97.9%

Buffer overflow in the cliproxy.objects.1 ActiveX control in the Symantec Client Proxy (CLIproxy.dll) in Symantec AntiVirus 10.0.x, 10.1.x before MR9, and 10.2.x before MR4; and Symantec Client Security 3.0.x and 3.1.x before MR9 allows remote attackers to execute arbitrary code via a long argument to the SetRemoteComputerName function.

Affected configurations

NVD
Node
symantecantivirusMatch10.0
OR
symantecantivirusMatch10.0.1
OR
symantecantivirusMatch10.0.1.1
OR
symantecantivirusMatch10.0.2
OR
symantecantivirusMatch10.0.2.1
OR
symantecantivirusMatch10.0.2.2
OR
symantecantivirusMatch10.0.3
OR
symantecantivirusMatch10.0.4
OR
symantecantivirusMatch10.0.5
OR
symantecantivirusMatch10.0.6
OR
symantecantivirusMatch10.0.7
OR
symantecantivirusMatch10.0.8
OR
symantecantivirusMatch10.0.9
OR
symantecantivirusMatch10.1
OR
symantecantivirusMatch10.1corporate
OR
symantecantivirusMatch10.1mp1corporate
OR
symantecantivirusMatch10.1mr4corporate
OR
symantecantivirusMatch10.1mr5corporate
OR
symantecantivirusMatch10.1mr7corporate
OR
symantecantivirusMatch10.1.0.1corporate
OR
symantecantivirusMatch10.1.4corporate
OR
symantecantivirusMatch10.1.4.1corporate
OR
symantecantivirusMatch10.1.5corporate
OR
symantecantivirusMatch10.1.5.1corporate
OR
symantecantivirusMatch10.1.6corporate
OR
symantecantivirusMatch10.1.6.1corporate
OR
symantecantivirusMatch10.1.7corporate
OR
symantecantivirusMatch10.2corporate
OR
symantecantivirusMatch10.2mr2corporate
OR
symantecantivirusMatch10.2mr3corporate
OR
symantecclient_securityMatch3.0
OR
symantecclient_securityMatch3.0mr1
OR
symantecclient_securityMatch3.0mr2
OR
symantecclient_securityMatch3.0.0.359
OR
symantecclient_securityMatch3.0.1.1000
OR
symantecclient_securityMatch3.0.1.1007
OR
symantecclient_securityMatch3.0.1.1008
OR
symantecclient_securityMatch3.0.2
OR
symantecclient_securityMatch3.0.2.2000
OR
symantecclient_securityMatch3.0.2.2001
OR
symantecclient_securityMatch3.0.2.2010
OR
symantecclient_securityMatch3.0.2.2011
OR
symantecclient_securityMatch3.0.2.2020
OR
symantecclient_securityMatch3.0.2.2021
OR
symantecclient_securityMatch3.1
OR
symantecclient_securityMatch3.1mr4
OR
symantecclient_securityMatch3.1mr5
OR
symantecclient_securityMatch3.1mr7
OR
symantecclient_securityMatch3.1.0.396
OR
symantecclient_securityMatch3.1.0.401
OR
symantecclient_securityMatch3.1.394
OR
symantecclient_securityMatch3.1.400
OR
symantecclient_securityMatch3.1.401
OR
symantecendpoint_protectionMatch11.0

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.9 High

AI Score

Confidence

Low

0.645 Medium

EPSS

Percentile

97.9%