In association with heise online

06 June 2007, 08:31

Hole in Symantec's Storage Foundation allows malicious code execution

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Security service provider TippingPoint has discovered a vulnerability in Symantec's (Veritas) Storage Foundation that can allow attackers to manipulate the system and execute arbitrary code. The problem is a lack of authentication for the Windows Scheduler Service (VxSchedService.exe). As a result, everyone can connect to the service on Port 4888 via the local network. Furthermore, TippingPoint says it is also possible to change, rewrite, and add arbitrary commands to the registry key HKEY_LOCAL_MACHINE\Software\Veritas\VxSvc\CurrentVersion\Schedules which can be executed when a manipulated schedule entry becomes due. Only Symantec's Storage Foundation for Windows 5.0 is affected. An update has been provided to remedy the flaw.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit