Vulnerabilities > CVE-2009-3028 - Unspecified vulnerability in Symantec products
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The Altiris eXpress NS SC Download ActiveX control in AeXNSPkgDLLib.dll, as used in Symantec Altiris Deployment Solution 6.9.x, Notification Server 6.0.x, and Symantec Management Platform 7.0.x exposes an unsafe method, which allows remote attackers to force the download of arbitrary files and possibly execute arbitrary code via the DownloadAndInstall method.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 30 |
Exploit-Db
description | Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute. CVE-2009-3028. Remote exploit for windows platform |
id | EDB-ID:16600 |
last seen | 2016-02-02 |
modified | 2010-11-24 |
published | 2010-11-24 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16600/ |
title | Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute |
Metasploit
description | This module allows remote attackers to install and execute arbitrary files on a users file system via AeXNSPkgDLLib.dll (6.0.0.1418). This module was tested against Symantec Altiris Deployment Solution 6.9 sp3. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/SYMANTEC_ALTIRISDEPLOYMENT_DOWNLOADANDINSTALL |
last seen | 2020-03-17 |
modified | 2017-07-24 |
published | 2009-09-09 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3028 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/symantec_altirisdeployment_downloadandinstall.rb |
title | Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute |
Nessus
NASL family | Windows |
NASL id | ALTIRIS_AEXNSPKGDLLIB_ACTIVEX_DOWNLOAD.NASL |
description | The Altiris.AeXNSPkgDL.1 ActiveX control, a component of Altiris Deployment Solution, Altiris Notification Server, and Symantec Management Platform, is installed on the remote Windows host. The installed version of this control provides an unsafe method, named |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 41062 |
published | 2009-09-23 |
reporter | This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/41062 |
title | Altiris Altiris.AeXNSPkgDL.1 ActiveX Control DownloadAndInstall() Method Arbitrary Code Execution |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83179/symantec_altirisdeployment_downloadandinstall.rb.txt |
id | PACKETSTORM:83179 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83179/Symantec-Altiris-Deployment-Solution-ActiveX-Control-Arbitrary-File-Download-and-Execute..html |
title | Symantec Altiris Deployment Solution ActiveX Control Arbitrary File Download and Execute. |
Saint
bid | 36346 |
description | Symantec Altiris eXpress NS SC Download ActiveX control vulnerability |
id | misc_av_symantec_altirisdl |
osvdb | 57893 |
title | altiris_express_ns_sc_download |
type | client |
References
- http://secunia.com/advisories/36679
- http://www.osvdb.org/57893
- http://www.securityfocus.com/bid/36346
- http://www.symantec.com/business/support/index?page=content&id=TECH44885
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090922_00