A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.
References
Link | Resource |
---|---|
https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-libdec2lha-so-stack-buffer-overflow-remote-code-execution/ | Third Party Advisory |
Configurations
History
31 Jan 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:broadcom:symantec_messaging_gateway:*:*:*:*:*:*:*:* | |
References | () https://blog.exodusintel.com/2024/01/25/symantec-messaging-gateway-libdec2lha-so-stack-buffer-overflow-remote-code-execution/ - Third Party Advisory | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
26 Jan 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-26 00:15
Updated : 2024-02-05 00:22
NVD link : CVE-2024-23615
Mitre link : CVE-2024-23615
CVE.ORG link : CVE-2024-23615
JSON object : View
Products Affected
broadcom
- symantec_messaging_gateway