The Scheduler Service (VxSchedService.exe) in Symantec Storage Foundation for Windows 5.0 allows remote attackers to bypass authentication and execute arbitrary code via certain requests to the service socket that create (1) PreScript or (2) PostScript registry values under Veritas\VxSvc\CurrentVersion\Schedules specifying future command execution.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.symantec.com/avcenter/security/Content/2007.06.01.html | patch vendor advisory |
http://secunia.com/advisories/25537 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/470562/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1018188 | vdb entry |
http://seer.entsupport.symantec.com/docs/288627.htm | |
http://osvdb.org/36104 | vdb entry |
http://www.securityfocus.com/bid/24194 | vdb entry |
http://www.vupen.com/english/advisories/2007/2035 | vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34680 | vdb entry |