Symantec Veritas Storage Foundation Scheduler Service (VxSchedService.exe) Remote Code Execution

High Nessus Plugin ID 25420


Arbitrary code can be executed on the remote host.


The remote host is running a version of Symantec Storage Foundation for Windows that is vulnerable to a remote scheduler service access. An attacker may exploit this flaw to modify or create scheduled commands and gain a full access to the system.

To exploit this flaw, an attacker would need to send requests to the TCP service listening on port 4888.


Plugin Details

Severity: High

ID: 25420

File Name: veritas_storage_foundation_bypass.nasl

Version: $Revision: 1.11 $

Type: remote

Published: 2007/06/04

Modified: 2012/08/23

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:veritas_storage_foundation

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2007/06/01

Vulnerability Publication Date: 2007/06/04

Reference Information

CVE: CVE-2007-2279

BID: 24194

OSVDB: 36104

CWE: 264