U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2009-1431 Detail

Description

XFR.EXE in the Intel File Transfer service in the console in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary code by placing the code on a (1) share or (2) WebDAV server, and then sending the UNC share pathname to this service.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

Evaluator Impact

Per vendor: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02 "Symantec System Center Impact Symantec System Center (SSS) is a Microsoft Management Console (MMC) plug-in which allows an administrator to manage all Symantec AntiVirus platforms from a single, centralized location. Alert Management System 2 (AMS2) is an alerting feature of System Center that listens for specific events and sends notifications as specified by the administrator. AMS2 is installed by default with Symantec System Center 9.0. AMS2 is an optional component in Symantec System Center 10.0 or 10.1. These vulnerabilities will only impact systems if AMS has been installed. Symantec AntiVirus Server Impact AMS2 is installed by default with Symantec AntiVirus Server 9.0. AMS2 is an optional component in Symantec AntiVirus Server 10.0 or 10.1. These vulnerabilities will only impact systems if AMS has been installed. Symantec AntiVirus and Symantec Endpoint Protection Central Quarantine Server Impact AMS2 is installed by default by Central Quarantine Server. These vulnerabilities will only impact systems if Quarantine Server has been installed. Symantec is not aware of any customers impacted by these issues, or of any attempts to exploit them. However, we recommend that any affected customers update their product immediately to protect against potential attempts to exploit these issues. Certain localized language versions of SCS 2.0/SAV 9.x were not patched due to compatibility issues on the localized platforms. As a result, customers who are running the following versions are strongly recommended to update to a non-vulnerable SCS 2.0/SAV 9 International English version or upgrade to a non-vulnerable version of SEP 11.x: Symantec Client Security 2.0/Symantec AntiVirus Corporate Edition 9.x (Chinese Simplified and Chinese Traditional) Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Chinese Simplified and Chinese Traditional) Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Korean) Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Japanese licensed)"

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=786 Third Party Advisory 
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=786 Third Party Advisory 
http://secunia.com/advisories/34856 Third Party Advisory 
http://secunia.com/advisories/34856 Third Party Advisory 
http://www.securityfocus.com/bid/34675 Third Party Advisory  VDB Entry 
http://www.securityfocus.com/bid/34675 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022130 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022130 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022131 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022131 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022132 Third Party Advisory  VDB Entry 
http://www.securitytracker.com/id?1022132 Third Party Advisory  VDB Entry 
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02 Vendor Advisory 
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02 Vendor Advisory 
http://www.vupen.com/english/advisories/2009/1204 Third Party Advisory 
http://www.vupen.com/english/advisories/2009/1204 Third Party Advisory 
https://exchange.xforce.ibmcloud.com/vulnerabilities/50179 Third Party Advisory  VDB Entry 
https://exchange.xforce.ibmcloud.com/vulnerabilities/50179 Third Party Advisory  VDB Entry 

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2009-1431
NVD Published Date:
04/29/2009
NVD Last Modified:
11/20/2024
Source:
MITRE