FKIE_CVE-2006-3072

Vulnerability from fkie_nvd - Published: 2006-06-19 10:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted "rule definitions", which produces dangerous Java code during M4 transformation.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8C16F58-1721-4B17-AA1F-02E20980820C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD93DCC8-8AAC-4B61-B3D5-9375C9C06D58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7CE75-747E-4384-B000-40F068CE2A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AAD9B35-AAF0-4E4E-97BF-62CC91807A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5CA0863-4D5E-4EF7-86E3-6025691C6051",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEA684D-2D2E-4A23-AC35-21838198773F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0BBD60A-5EC7-4F0A-A8B4-D284FE42FB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13AB5D-20DD-416D-8364-F6F30E254A29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FEC51C7-A00E-4E19-AFC5-0FAEDB1BA565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "268026EA-1460-47B7-B2E6-9957CED871CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14E6CAB-3B7F-4D53-A8C2-C321405C9AC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A081EF8-2315-4628-B7C4-F2E03E9D9213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E43189F8-A352-431F-BAB5-A565DC4EA554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F59F3EB-14BE-4D10-80F0-775769C6F980",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F11D5E-D201-469C-B738-C18D65B8A4ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "72FBA84C-1ABD-46B3-96D0-042304EC9213",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F3709D0-0070-414F-B66D-C52DDD9F0650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "270A46FF-2DA2-4B69-9075-9A3CBA22267E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CF7EAA1-36E3-43A2-AE88-8BCA5D876645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93EA02A-4C0E-49CD-BB26-9333489D4F82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2BF1AC-97EE-4D7F-913F-5B8A8F2C0B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "89581951-8161-45A4-AC9D-236B40E17566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9DA0EE-0019-47AB-9583-4C1894E5618D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "E512464F-2A97-4B0C-B3C7-F3E131820855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD7ECCE-9588-4251-B927-51BB9C282AB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A8217A-43B3-4268-A9C8-E3BB787B5227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "35FB0A6A-A3CF-4150-AC8B-E6BA86387312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0253C96B-D94F-4CEB-8E5B-11BBF05E528E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "19680827-92F6-4BE2-8F14-E0A0D24A9F6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:symantec:security_information_manager:4.0.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08174AC-0BFE-42E6-8DA6-E5016216553A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "M4 Macro Library in Symantec Security Information Manager before 4.0.2.29 HOTFIX 1 allows local users to execute arbitrary commands via crafted \"rule definitions\", which produces dangerous Java code during M4 transformation."
    },
    {
      "lang": "es",
      "value": "Librer\u00eda M4 Macro de Symantec Security Information Manager anteriores a 4.0.2.29 HOTFIX 1 permiste a usuarios locales ejecutar comandos arbitrarios a trav\u00e9s de \"reglas de definici\u00f3n\" modificadas, lo que produce c\u00f3digo Java peligroso durante la transformaci\u00f3n M4."
    }
  ],
  "id": "CVE-2006-3072",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-19T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20647"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.06.13b.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016296"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18420"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2334"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.06.13b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1016296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27105"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…