漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.
漏洞信息
N/A
漏洞
N/A
漏洞
Symantec杀毒软件 Intel Alert Originator服务栈溢出漏洞
漏洞信息
Symantec AntiVirus是非常流行的杀毒解决方案。 Symantec杀毒软件中的Intel Alert Originator服务(IAO.EXE)没有正确地验证通过memcpy()调用发送给栈缓冲区的数据。如果远程攻击者向默认监听的TCP 38292端口发送了畸形报文的话,就可以触发栈溢出,导致以SYSTEM权限执行任意代码。
漏洞信息
N/A
漏洞
N/A