Symantec Veritas Enterprise Administrator Service (vxsvc) Multiple Integer Overflows

critical Nessus Plugin ID 56239


The remote host is running an administrator service that is affected by multiple integer overflow vulnerabilities.


Symantec Veritas Enterprise Administrator Service (vxsvc), a component of Veritas Storage Foundation and other products, is running on the remote host.

Based on the response from the service, the running version of Symantec Veritas Enterprise Administrator service is affected by multiple integer overflow vulnerabilities, leading to buffer overflows in the following functions :

- vxveautil.value_binary_unpack(), for ASCII string handling

- vxveautil.value_binary_unpack(), for UNICODE string handling

- vxveautil.kv_binary_unpack()

By exploiting these flaws, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Apply the relevant patch from the Symantec advisory.

See Also

Plugin Details

Severity: Critical

ID: 56239

File Name: veritas_vxsvc_multiple_vulns_remote.nbin

Version: 1.74

Type: remote

Published: 9/20/2011

Updated: 3/25/2024

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:veritas:enterprise_administrator, cpe:/a:symantec:veritas_storage_foundation

Exploit Ease: No known exploits are available

Patch Publication Date: 8/8/2011

Vulnerability Publication Date: 8/15/2011

Reference Information

CVE: CVE-2011-0547

BID: 49014

IAVB: 2011-B-0108