FKIE_CVE-2006-3072
Vulnerability from fkie_nvd - Published: 2006-06-19 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted "rule definitions", which produces dangerous Java code during M4 transformation.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C16F58-1721-4B17-AA1F-02E20980820C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD93DCC8-8AAC-4B61-B3D5-9375C9C06D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44D7CE75-747E-4384-B000-40F068CE2A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3AAD9B35-AAF0-4E4E-97BF-62CC91807A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C5CA0863-4D5E-4EF7-86E3-6025691C6051",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0AEA684D-2D2E-4A23-AC35-21838198773F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D0BBD60A-5EC7-4F0A-A8B4-D284FE42FB8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9B13AB5D-20DD-416D-8364-F6F30E254A29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEC51C7-A00E-4E19-AFC5-0FAEDB1BA565",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "268026EA-1460-47B7-B2E6-9957CED871CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E14E6CAB-3B7F-4D53-A8C2-C321405C9AC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "8A081EF8-2315-4628-B7C4-F2E03E9D9213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E43189F8-A352-431F-BAB5-A565DC4EA554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6F59F3EB-14BE-4D10-80F0-775769C6F980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "42F11D5E-D201-469C-B738-C18D65B8A4ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "72FBA84C-1ABD-46B3-96D0-042304EC9213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "7F3709D0-0070-414F-B66D-C52DDD9F0650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "270A46FF-2DA2-4B69-9075-9A3CBA22267E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF7EAA1-36E3-43A2-AE88-8BCA5D876645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "A93EA02A-4C0E-49CD-BB26-9333489D4F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2BF1AC-97EE-4D7F-913F-5B8A8F2C0B87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "89581951-8161-45A4-AC9D-236B40E17566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9DA0EE-0019-47AB-9583-4C1894E5618D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E512464F-2A97-4B0C-B3C7-F3E131820855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD7ECCE-9588-4251-B927-51BB9C282AB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A8217A-43B3-4268-A9C8-E3BB787B5227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "35FB0A6A-A3CF-4150-AC8B-E6BA86387312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "0253C96B-D94F-4CEB-8E5B-11BBF05E528E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "19680827-92F6-4BE2-8F14-E0A0D24A9F6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "C08174AC-0BFE-42E6-8DA6-E5016216553A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted \"rule definitions\", which produces dangerous Java code during M4 transformation."
},
{
"lang": "es",
"value": "Librer\u00eda M4 Macro de Symantec Security Information Manager anteriores a 4.0.2.29 HOTFIX 1 permiste a usuarios locales ejecutar comandos arbitrarios a trav\u00e9s de \"reglas de definici\u00f3n\" modificadas, lo que produce c\u00f3digo Java peligroso durante la transformaci\u00f3n M4."
}
],
"id": "CVE-2006-3072",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-06-19T10:02:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20647"
},
{
"source": "cve@mitre.org",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.06.13b.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1016296"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/18420"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/2334"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/20647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.06.13b.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1016296"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/18420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/2334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27105"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…