Vulnerability Name:

CVE-2006-2630 (CCN-26706)

Assigned:2006-05-25
Published:2006-05-25
Updated:2018-10-18
Summary:Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Fri May 26 2006 - 19:18:45 CDT
Symantec antivirus software exposes computers

Source: CCN
Type: Full-Disclosure Mailing List, Fri May 26 2006 - 11:40:07 CDT
new symantec vuln

Source: MITRE
Type: CNA
CVE-2006-2630

Source: FULLDISC
Type: UNKNOWN
20060526 new symantec vuln

Source: CCN
Type: SA20318
Symantec Client Security / AntiVirus Management Interface Buffer Overflow

Source: SECUNIA
Type: Patch, Vendor Advisory
20318

Source: CCN
Type: Symantec Security Response Advisory SYM06-010
Symantec Client Security and Symantec AntiVirus Elevation of Privilege

Source: CONFIRM
Type: Patch, Vendor Advisory
http://securityresponse.symantec.com/avcenter/security/Content/2006.05.25.html

Source: CCN
Type: SECTRACK ID: 1016161
Symantec Client Security Stack Overflow Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1016161

Source: CCN
Type: SECTRACK ID: 1016162
Symantec AntiVirus Corporate Edition Stack Overflow Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1016162

Source: CCN
Type: eEye Digital Security Advisory AD20060612
Symantec Remote Management Stack Buffer Overflow

Source: EEYE
Type: UNKNOWN
EEYEB-20060524

Source: CCN
Type: US-CERT VU#404910
Symantec products vulnerable to buffer overflow

Source: CERT-VN
Type: Patch, US Government Resource
VU#404910

Source: CCN
Type: OSVDB ID: 25846
Symantec Client Security / AntiVirus Management Interface Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20060527 Symantec antivirus software exposes computers

Source: BID
Type: Patch
18107

Source: CCN
Type: BID-18107
Symantec AntiVirus Remote Stack Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-2005

Source: CCN
Type: Internet Security Systems Protection Alert June 2, 2006
Symantec AntiVirus and Client Security buffer overflow

Source: XF
Type: UNKNOWN
symantec-antivirus-client-bo(26706)

Source: XF
Type: UNKNOWN
symantec-antivirus-client-bo(26706)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:symantec:client_security:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.394:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.400:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*
  • OR cpe:/a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.394:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.400:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.0::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.1::corporate:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    symantec client security 3.0
    symantec client security 3.0.2.2010
    symantec client security 3.0.2.2020
    symantec client security 3.1
    symantec client security 3.1.394
    symantec client security 3.1.400
    symantec norton antivirus 10.0
    symantec norton antivirus 10.0.2.2010
    symantec norton antivirus 10.0.2.2020
    symantec norton antivirus 10.0.2.2021
    symantec norton antivirus 10.1
    symantec norton antivirus 10.1.400
    symantec client security 3.0.2.2010
    symantec client security 3.0.2.2020
    symantec client security 3.0
    symantec client security 3.1
    symantec client security 3.1.394
    symantec client security 3.1.400
    symantec antivirus 10.0
    symantec antivirus 10.1