Symantec products vulnerable to buffer overflow

ID VU:404910
Type cert
Reporter CERT
Modified 2006-06-13T15:26:00



Symantec products are vulnerable to a stack-based buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.


Symantec Client Security and Symantec Antivirus Corporate Edition contain a stack-based buffer overflow. For information on specific versions of Symantec Client Security and Symantec Antivirus Corporate Edition that are affected, refer to Symantec Advisory SYM06-010.

Note that the affected products typically run with SYSTEM privileges.


A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges.


Apply updates
Symantec has released updates to correct this vulnerability. Refer to Symantec Advisory SYM06-010 for more information.

Vendor Information


Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Symantec, Inc. __ Affected

Updated: May 30, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to <>.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
Base | |
Temporal | |
Environmental | |


  • <>
  • <>
  • <>
  • <>
  • <>


This vulnerability was reported by eEye Digital Security.

This document was written by Jeff Gennari.

Other Information

CVE IDs: | CVE-2006-2630
Severity Metric: | 24.30
Date Public: | 2006-05-24
Date First Published: | 2006-05-30
Date Last Updated: | 2006-06-13 15:26 UTC
Document Revision: | 22