Vulnerability Details : CVE-2009-1432
Symantec Reporting Server, as used in Symantec AntiVirus (SAV) Corporate Edition 10.1 before 10.1 MR8 and 10.2 before 10.2 MR2, Symantec Client Security (SCS) before 3.1 MR8, and the Symantec Endpoint Protection Manager (SEPM) component in Symantec Endpoint Protection (SEP) before 11.0 MR2, allows remote attackers to inject arbitrary text into the login screen, and possibly conduct phishing attacks, via vectors involving a URL that is not properly handled.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2009-1432
Probability of exploitation activity in the next 30 days: 1.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 84 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-1432
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-1432
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1432
-
http://securitytracker.com/id?1022138
Third Party Advisory;VDB Entry
-
http://securitytracker.com/id?1022136
Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2009/1204
Third Party Advisory
-
http://www.securityfocus.com/bid/34668
Third Party Advisory;VDB Entry
-
http://securitytracker.com/id?1022137
Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2009/1202
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/50172
Third Party Advisory;VDB Entry
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_00
Vendor Advisory
Products affected by CVE-2009-1432
- cpe:2.3:a:symantec:client_security:3.1:maintenance_release7:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1:-:*:*:*:*:*:*
- cpe:2.3:a:symantec:antivirus:10.1:-:*:*:corporate:*:*:*
- cpe:2.3:a:symantec:antivirus:10.1:maintenance_release7:*:*:corporate:*:*:*
- cpe:2.3:a:symantec:antivirus:10.2:-:*:*:corporate:*:*:*
- cpe:2.3:a:symantec:antivirus:10.2:maintenance_release1:*:*:corporate:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:maintenance_release1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*