Vulnerability Details : CVE-2009-3031
Stack-based buffer overflow in the BrowseAndSaveFile method in the Altiris eXpress NS ConsoleUtilities ActiveX control 6.0.0.1846 in AeXNSConsoleUtilities.dll in Symantec Altiris Notification Server (NS) 6.0 before R12, Deployment Server 6.8 and 6.9 in Symantec Altiris Deployment Solution 6.9 SP3, and Symantec Management Platform (SMP) 7.0 before SP3 allows remote attackers to execute arbitrary code via a long string in the second argument.
Vulnerability category: OverflowExecute code
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2009-3031
Probability of exploitation activity in the next 30 days: 96.40%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2009-3031
-
Symantec ConsoleUtilities ActiveX Control Buffer Overflow
Disclosure Date : 2009-11-02exploit/windows/browser/symantec_consoleutilities_browseandsavefileThis module exploits a stack buffer overflow in Symantecs ConsoleUtilities. By sending an overly long string to the "BrowseAndSaveFile()" method located in the AeXNSConsoleUtilities.dll (6.0.0.1846) Control, an attacker may be able to execute arbitrary code Authors: - Nikolas Sotiriu (lofi)
CVSS scores for CVE-2009-3031
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
[email protected] |
CWE ids for CVE-2009-3031
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2009-3031
-
https://kb.altiris.com/article.asp?article=49389&p=1
Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/3117
Patch;Vendor Advisory
-
https://kb.altiris.com/article.asp?article=49568&p=1
Vendor Advisory
-
http://sotiriu.de/adv/NSOADV-2009-001.txt
Exploit
-
http://www.securityfocus.com/bid/36698
Exploit;Patch
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20091102_00
-
http://www.securityfocus.com/archive/1/507625/100/0/threaded
Products affected by CVE-2009-3031
- cpe:2.3:a:symantec:altiris_deployment_solution:6.9:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_deployment_solution:6.9:sp3:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:6.0:*:sp1:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:6.0:sp3_r7:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_notification_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_management_platform:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:altiris_management_platform:7.0:*:*:*:*:*:*:*