HIGH · 9.3

CVE-2009-1430

Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server;...

Vulnerability Description

Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.

CVSS Score

9.3

HIGH

AV:N/AC:M/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
SymantecAntivirus<= 9.0
SymantecAntivirus Central Quarantine ServerAll versions
SymantecClient Security<= 3.1
SymantecEndpoint Protection<= 11.0
SymantecSystem CenterAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2009-1430?

CVE-2009-1430 is a vulnerability with a CVSS score of 9.3 (HIGH). Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server;...

How severe is CVE-2009-1430?

CVE-2009-1430 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-1430?

Check the references section above for vendor advisories and patch information. Affected products include: Symantec Antivirus, Symantec Antivirus Central Quarantine Server, Symantec Client Security, Symantec Endpoint Protection, Symantec System Center.