CVE-2010-0111

HDNLRSVC.EXE in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allows remote attackers to execute arbitrary programs by sending msgsys.exe a UNC share pathname, which is used directly in a CreateProcessA (aka CreateProcess) call.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0:mr1:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0:mr2:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.1.2:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:mr6:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.8:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.1.9:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:*
cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:symantec:system_center:10.0:*:*:*:*:*:*:*
cpe:2.3:a:symantec:system_center:10.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.5:*:*:*:*:*:*:*
cpe:2.3:a:symantec:antivirus_central_quarantine_server:3.6:*:*:*:*:*:*:*

History

No history.

Information

Published : 2011-01-31 21:00

Updated : 2024-02-28 11:41


NVD link : CVE-2010-0111

Mitre link : CVE-2010-0111

CVE.ORG link : CVE-2010-0111


JSON object : View

Products Affected

symantec

  • antivirus_central_quarantine_server
  • system_center
  • antivirus
CWE
CWE-20

Improper Input Validation