Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Symantec AntiVirus Scan Engine Multiple Remote Vulnerabilities


Vulnerability Assessment Details

Symantec AntiVirus Scan Engine Multiple Remote Vulnerabilities

Vulnerability Assessment Summary
Checks if Symantec Scan Engine is vulnerable

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to take control of the remote scan engine.

Description :

The remote host appears to be running Symantec Scan Engine.

This version of Scan Engine is vulnerable to multiple flaws which may
permit a remote attacker to take control of the scan engine. Following
flaws are present:

- Fixed https certificate key
- Configuration file retrieval (with administrator password hash)
- Possibility to change the administrator password

Solution :

Upgrade to Scan Engine 5.1.0.7 or later.

Network Security Threat Level:

Critical / CVSS Base Score : 10.0
(AV:R/AC:L/Au:NR/C:C/I:C/A:C/B:N)

Networks Security ID: 17637

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

SAMSUNG 840 Pro 2.5" 128GB SATA III MLC Internal Solid State Drive SSD MZ-7PD12
$35.0
SAMSUNG 840 Pro 2.5Intel DC S3700 800GB SATA 2.5" Internal Solid State Drive
$2254.74
Intel DC S3700 800GB SATA 2.5OCZ Solid 3 sata III Solid State Drive 60 GB - PN SLD3-25SATA3-60GB
$39.99
OCZ Solid 3 sata III Solid State Drive 60 GB -  PN SLD3-25SATA3-60GB picture cf compact flash memory card to 50 pin 1.8" ide hard drive ssd converter
$11.35
 cf compact flash memory card to 50 pin 1.8


Discussions

No Discussions have been posted on this vulnerability.