Symantec Veritas Storage Foundation vulnerabilities

5 known vulnerabilities affecting symantec/veritas_storage_foundation.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL5

Vulnerabilities

Page 1 of 1
CVE-2011-0547CRITICALCVSS 10.0≤ 5.1v5.02011-08-19
CVE-2011-0547 [CRITICAL] CWE-189 CVE-2011-0547: Multiple integer overflows in vxsvc.exe in the Veritas Enterprise Administrator service in Symantec Multiple integer overflows in vxsvc.exe in the Veritas Enterprise Administrator service in Symantec Veritas Storage Foundation 5.1 and earlier, Veritas Storage Foundation Cluster File System (SFCFS) 5.1 and earlier, Veritas Storage Foundation Cluster File System Enterprise for Oracle RAC (SFCFSORAC) 5.1 and earlier, Veritas Dynamic Multi-Pathing (DMP
nvd
CVE-2009-3027CRITICALCVSS 10.0v3.52009-12-11
CVE-2009-3027 [CRITICAL] CWE-287 CVE-2009-3027: VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12. VRTSweb.exe in VRTSweb in Symantec Backup Exec Continuous Protection Server (CPS) 11d, 12.0, and 12.5; Veritas NetBackup Operations Manager (NOM) 6.0 GA through 6.5.5; Veritas Backup Reporter (VBR) 6.0 GA through 6.6; Veritas Storage Foundation (SF) 3.5; Veritas Storage Foundation for Windows High Availability (SFWHA) 4.3MP2, 5.0, 5.0RP1a, 5.0RP2, 5
nvd
CVE-2008-3703CRITICALCVSS 10.0v5.0v5.12008-08-18
CVE-2008-3703 [CRITICAL] CVE-2008-3703: The management console in the Volume Manager Scheduler Service (aka VxSchedService.exe) in Symantec The management console in the Volume Manager Scheduler Service (aka VxSchedService.exe) in Symantec Veritas Storage Foundation for Windows (SFW) 5.0, 5.0 RP1a, and 5.1 accepts NULL NTLMSSP authentication, which allows remote attackers to execute arbitrary code via requests to the service socket that create "snapshots schedules" registry values specifying fut
nvd
CVE-2008-0638CRITICALCVSS 9.3v5.02008-02-21
CVE-2008-0638 [CRITICAL] CWE-119 CVE-2008-0638: Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Heap-based buffer overflow in the Veritas Enterprise Administrator (VEA) service (aka vxsvc.exe) in Symantec Veritas Storage Foundation 5.0 allows remote attackers to execute arbitrary code via a packet with a crafted value of a certain size field, which is not checked for consistency with the actual buffer size.
nvd
CVE-2007-2279CRITICALCVSS 9.3v5.02007-06-04
CVE-2007-2279 [CRITICAL] CWE-264 CVE-2007-2279: The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows rem The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.
nvd