Symantec Veritas Storage Foundation Scheduler Service (VxSchedService.exe) Remote Code Execution

high Nessus Plugin ID 25420


Arbitrary code can be executed on the remote host.


The remote host is running a version of Symantec Storage Foundation for Windows that is vulnerable to a remote scheduler service access. An attacker may exploit this flaw to modify or create scheduled commands and gain a full access to the system.

To exploit this flaw, an attacker would need to send requests to the TCP service listening on port 4888.


Plugin Details

Severity: High

ID: 25420

File Name: veritas_storage_foundation_bypass.nasl

Version: 1.12

Type: remote

Published: 6/4/2007

Updated: 8/6/2018

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:veritas_storage_foundation

Exploit Ease: No known exploits are available

Patch Publication Date: 6/1/2007

Vulnerability Publication Date: 6/4/2007

Reference Information

CVE: CVE-2007-2279

BID: 24194

CWE: 264