Symantec Veritas Enterprise Administrator Service (vxsvc) Multiple Integer Overflows

Critical Nessus Plugin ID 56239


The remote host is running an administrator service that is affected by multiple integer overflow vulnerabilities.


Symantec Veritas Enterprise Administrator Service (vxsvc), a component of Veritas Storage Foundation and other products, is running on the remote host.

Based on the response from the service, the running version of Symantec Veritas Enterprise Administrator service is affected by multiple integer overflow vulnerabilities, leading to buffer overflows in the following functions :

- vxveautil.value_binary_unpack(), for ASCII string handling

- vxveautil.value_binary_unpack(), for UNICODE string handling

- vxveautil.kv_binary_unpack()

By exploiting these flaws, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Apply the relevant patch from the Symantec advisory.

See Also

Plugin Details

Severity: Critical

ID: 56239

File Name: veritas_vxsvc_multiple_vulns_remote.nbin

Version: 1.46

Type: remote

Published: 2011/09/20

Updated: 2020/06/12

Dependencies: 56238

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:veritas:enterprise_administrator, cpe:/a:symantec:veritas_storage_foundation

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/08/08

Vulnerability Publication Date: 2011/08/15

Reference Information

CVE: CVE-2011-0547

BID: 49014

IAVB: 2011-B-0108