The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Symantec Enterprise Vault

vulnerability alert CVE-2013-1609

Symantec Enterprise Vault for File System Archiving: privilege elevation

Synthesis of the vulnerability

A local attacker can store a malicious program in the search path of two services of Symantec Enterprise Vault for File System Archiving, in order to execute code with system privileges.
Impacted products: Symantec Enterprise Vault.
Severity: 2/4.
Consequences: administrator access/rights.
Provenance: user shell.
Creation date: 22/03/2013.
Identifiers: BID-58617, CVE-2013-1609, SYM13-003, VIGILANCE-VUL-12551.

Description of the vulnerability

The Symantec Enterprise Vault for File System Archiving product installs two services:
 - File Collector
 - File PlaceHolder

These services runs with system privileges. However, they load a program from the system search path.

A local attacker can therefore store a malicious program in the search path of two services of Symantec Enterprise Vault for File System Archiving, in order to execute code with system privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2013-0393 CVE-2013-0418

Oracle Outside In Technology: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are fixed by the CPU of January 2013.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 16/01/2013.
Revision date: 18/01/2013.
Identifiers: 2809279, BID-57357, BID-57364, CERTA-2013-AVI-041, CERTA-2013-AVI-116, cpujan2013, CVE-2013-0393, CVE-2013-0418, MS13-012, VIGILANCE-VUL-12333, ZDI-13-001.

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can create malicious Paradox data, in order to force the vspdx.dll library to read at an invalid memory address, which leads to a denial of service. [severity:2/4; BID-57357, CVE-2013-0393]

An attacker can create malicious Paradox data, in order to trigger a buffer overflow in the vspdx.dll library, which can lead to code execution. [severity:3/4; BID-57364, CVE-2013-0418]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2012-3214 CVE-2012-3217

Oracle Outside In Technology: several vulnerabilities of October 2012

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are corrected by the CPU of October 2012.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 2/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 17/10/2012.
Identifiers: 2784242, BID-55977, BID-55993, CERTA-2012-AVI-578, CERTA-2013-AVI-117, cpuoct2012, CVE-2012-3214, CVE-2012-3217, MS13-013, PRL-2012-30, VIGILANCE-VUL-12076.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can create a malicious JPG image, which generates an error in the ibjpg2.flt filter, in order to create a denial of service. [severity:2/4; BID-55977, CVE-2012-3214, PRL-2012-30]

An attacker can use a vulnerability of Outside In HTML Export SDK, in order to create a denial of service. [severity:2/4; BID-55993, CVE-2012-3217]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2012-1744 CVE-2012-1766 CVE-2012-1767

Oracle Outside In Technology: several vulnerabilities of July 2012

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are corrected by the CPU of July 2012.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 14.
Creation date: 25/07/2012.
Identifiers: 2737111, 2740358, 2742321, BID-54497, BID-54500, BID-54504, BID-54506, BID-54511, BID-54531, BID-54536, BID-54541, BID-54543, BID-54546, BID-54548, BID-54550, BID-54552, BID-54554, CERTA-2012-ALE-004, CERTA-2012-AVI-393, CERTA-2012-AVI-441, CERTA-2012-AVI-541, CERTA-2012-AVI-557, cpujul2012, CVE-2012-1744, CVE-2012-1766, CVE-2012-1767, CVE-2012-1768, CVE-2012-1769, CVE-2012-1770, CVE-2012-1771, CVE-2012-1772, CVE-2012-1773, CVE-2012-3106, CVE-2012-3107, CVE-2012-3108, CVE-2012-3109, CVE-2012-3110, KB75998, MS12-058, MS12-067, PRL-2012-24, PRL-2012-25, PRL-2012-26, SYM12-015, VIGILANCE-VUL-11794, VU#118913.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can use a vulnerability of the CDR format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54531, CVE-2012-1766]

An attacker can use a vulnerability of the DOC format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54536, CVE-2012-1767]

An attacker can use a vulnerability of the DPT format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54511, CVE-2012-1768]

An attacker can use a vulnerability of the JP2 format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54500, CVE-2012-1769]

An attacker can use a vulnerability of the LWP format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54541, CVE-2012-1770]

An attacker can use a vulnerability of the ODG format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54543, CVE-2012-1771]

An attacker can use a vulnerability of the PCX format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54497, CVE-2012-1772]

An attacker can use a vulnerability of the PDF format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54548, CVE-2012-1773]

An attacker can use a vulnerability of the SAM format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54546, CVE-2012-3106]

An attacker can use a vulnerability of the SXD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54504, CVE-2012-3107]

An attacker can use a vulnerability of the SXI format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54550, CVE-2012-3108]

An attacker can use a vulnerability of the VSD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54554, CVE-2012-3109]

An attacker can use a vulnerability of the WSD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54506, CVE-2012-3110]

An attacker can use a vulnerability of Oracle Outside In Technology, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54552, CVE-2012-1744]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2012-0110

McAfee GroupShield, Symantec Enterprise Vault: code execution via Oracle Outside In

Synthesis of the vulnerability

An attacker can send a malformed Lotus 123 file to an application using Oracle Outside In module, in order to execute code.
Impacted products: GroupShield, Symantec Enterprise Vault.
Severity: 2/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 19/01/2012.
Identifiers: CVE-2012-0110, MAPG-8QKLAG, SYM12-004, TECH182366, VIGILANCE-VUL-11304, VU#738961.

Description of the vulnerability

The Oracle Outside In product offers data conversion features. The McAfee GroupShield and Symantec Enterprise Vault products use Oracle Outside In.

The vswk4.dll (libvs_wk4.so) library of Oracle Outside In decodes files in format Lotus 123 version 4. However, a malformed file corrupts the memory of vswk4.dll.

An attacker can therefore send a malformed Lotus 123 file to an application using Oracle Outside In module, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2011-0794 CVE-2011-0808 CVE-2011-2264

McAfee GroupShield, Symantec Enterprise Vault: three vulnerabilities of Oracle Outside In

Synthesis of the vulnerability

Three vulnerabilities of the Oracle Outside In module impact McAfee GroupShield and Symantec Enterprise Vault.
Impacted products: GroupShield, Symantec Enterprise Vault.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 02/09/2011.
Revision date: 23/09/2011.
Identifiers: BID-47435, BID-47437, BID-48766, CERTA-2011-AVI-492, CERTA-2011-AVI-497, CERTA-2011-AVI-603, CERTA-2012-AVI-041, CVE-2011-0794, CVE-2011-0808, CVE-2011-2264, SYM11-011, TECH167455, VIGILANCE-VUL-10967, VU#103425, VU#520721.

Description of the vulnerability

The Oracle Outside In product offers data conversion features. The McAfee GroupShield and Symantec Enterprise Vault products use Oracle Outside In. However, three vulnerabilities were announced in the Oracle Outside In module.

An attacker can use a vulnerability of Oracle Outside In Technology, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-48766, CERTA-2011-AVI-497, CERTA-2012-AVI-041, CVE-2011-2264, VU#103425]

An attacker can use a vulnerability of Oracle Outside In Technology, in order to create a denial of service. [severity:1/4; BID-47435, CERTA-2011-AVI-492, CERTA-2011-AVI-603, CVE-2011-0794, VU#520721]

An attacker can use a vulnerability of Oracle Outside In Technology, in order to create a denial of service. [severity:1/4; BID-47437, CVE-2011-0808, VU#520721]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.