Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-6827

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-08 Jun, 2009 | 19:00
Updated At-07 Aug, 2024 | 11:42
Rejected At-
Credits

The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a "Shatter" style attack on the "command prompt" hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:08 Jun, 2009 | 19:00
Updated At:07 Aug, 2024 | 11:42
Rejected At:
▼CVE Numbering Authority (CNA)

The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a "Shatter" style attack on the "command prompt" hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1021071
vdb-entry
x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=122460544316205&w=2
mailing-list
x_refsource_BUGTRAQ
http://www.symantec.com/avcenter/security/Content/2008.10.20a.html
x_refsource_CONFIRM
http://secunia.com/advisories/31773
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/46006
vdb-entry
x_refsource_XF
http://www.vupen.com/english/advisories/2008/2876
vdb-entry
x_refsource_VUPEN
http://osvdb.org/49426
vdb-entry
x_refsource_OSVDB
http://www.insomniasec.com/advisories/ISVA-081020.1.htm
x_refsource_MISC
http://www.securityfocus.com/bid/31766
vdb-entry
x_refsource_BID
Hyperlink: http://www.securitytracker.com/id?1021071
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://marc.info/?l=bugtraq&m=122460544316205&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.symantec.com/avcenter/security/Content/2008.10.20a.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31773
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46006
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.vupen.com/english/advisories/2008/2876
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://osvdb.org/49426
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.insomniasec.com/advisories/ISVA-081020.1.htm
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/31766
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securitytracker.com/id?1021071
vdb-entry
x_refsource_SECTRACK
x_transferred
http://marc.info/?l=bugtraq&m=122460544316205&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.symantec.com/avcenter/security/Content/2008.10.20a.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31773
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/46006
vdb-entry
x_refsource_XF
x_transferred
http://www.vupen.com/english/advisories/2008/2876
vdb-entry
x_refsource_VUPEN
x_transferred
http://osvdb.org/49426
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.insomniasec.com/advisories/ISVA-081020.1.htm
x_refsource_MISC
x_transferred
http://www.securityfocus.com/bid/31766
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securitytracker.com/id?1021071
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=122460544316205&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.symantec.com/avcenter/security/Content/2008.10.20a.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31773
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46006
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2876
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://osvdb.org/49426
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.insomniasec.com/advisories/ISVA-081020.1.htm
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/31766
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:08 Jun, 2009 | 19:30
Updated At:14 Feb, 2024 | 17:26

The ListView control in the Client GUI (AClient.exe) in Symantec Altiris Deployment Solution 6.x before 6.9.355 SP1 allows local users to gain SYSTEM privileges and execute arbitrary commands via a "Shatter" style attack on the "command prompt" hidden GUI button to (1) overwrite the CommandLine parameter to cmd.exe to use SYSTEM privileges and (2) modify the DLL that is loaded using the LoadLibrary API function.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.8MEDIUM
AV:L/AC:L/Au:S/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

Symantec Corporation
symantec
>>altiris_deployment_solution>>Versions from 6.0(inclusive) to 6.9.355(exclusive)
cpe:2.3:a:symantec:altiris_deployment_solution:*:*:*:*:*:*:*:*
Symantec Corporation
symantec
>>altiris_deployment_solution>>6.9.355
cpe:2.3:a:symantec:altiris_deployment_solution:6.9.355:-:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=122460544316205&w=2cve@mitre.org
Mailing List
http://osvdb.org/49426cve@mitre.org
Broken Link
http://secunia.com/advisories/31773cve@mitre.org
Broken Link
Vendor Advisory
http://www.insomniasec.com/advisories/ISVA-081020.1.htmcve@mitre.org
Broken Link
Patch
http://www.securityfocus.com/bid/31766cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1021071cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.symantec.com/avcenter/security/Content/2008.10.20a.htmlcve@mitre.org
Broken Link
Patch
Vendor Advisory
http://www.vupen.com/english/advisories/2008/2876cve@mitre.org
Broken Link
Patch
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/46006cve@mitre.org
Third Party Advisory
VDB Entry
Hyperlink: http://marc.info/?l=bugtraq&m=122460544316205&w=2
Source: cve@mitre.org
Resource:
Mailing List
Hyperlink: http://osvdb.org/49426
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/31773
Source: cve@mitre.org
Resource:
Broken Link
Vendor Advisory
Hyperlink: http://www.insomniasec.com/advisories/ISVA-081020.1.htm
Source: cve@mitre.org
Resource:
Broken Link
Patch
Hyperlink: http://www.securityfocus.com/bid/31766
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id?1021071
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.symantec.com/avcenter/security/Content/2008.10.20a.html
Source: cve@mitre.org
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://www.vupen.com/english/advisories/2008/2876
Source: cve@mitre.org
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/46006
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

57Records found

CVE-2020-27985
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.56%
||
7 Day CHG~0.00%
Published-23 Nov, 2020 | 13:46
Updated-04 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Security Onion v2 prior to 2.3.10 has an incorrect sudo configuration, which allows the administrative user to obtain root access without using the sudo password by editing and executing /home/<user>/SecurityOnion/setup/so-setup.

Action-Not Available
Vendor-securityonionsolutionsn/a
Product-security_onionn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-8012
Matching Score-4
Assigner-Ivanti
ShareView Details
Matching Score-4
Assigner-Ivanti
CVSS Score-7.8||HIGH
EPSS-0.17% / 38.33%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 20:37
Updated-12 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass weakness in the message broker service of Ivanti Workspace Control before version 2025.2 (10.19.0.0) allows a local authenticated attacker to escalate their privileges.

Action-Not Available
Vendor-Ivanti Software
Product-workspace_controlWorkspace Controlworkspace_control
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-7125
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.52%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 04:15
Updated-21 Jan, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in Hitachi Ops Center Common Services

Authentication Bypass vulnerability in Hitachi Ops Center Common Services.This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.2-01.

Action-Not Available
Vendor-Linux Kernel Organization, IncHitachi, Ltd.
Product-ops_center_common_serviceslinux_kernelHitachi Ops Center Common Servicesops_center_common_services
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-0463
Matching Score-4
Assigner-Devolutions Inc.
ShareView Details
Matching Score-4
Assigner-Devolutions Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.68%
||
7 Day CHG~0.00%
Published-24 Jan, 2023 | 16:42
Updated-02 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.

Action-Not Available
Vendor-Devolutions
Product-remote_desktop_managerRemote Desktop Manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10537
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.01%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 09:17
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Epikur before 20.1.1. A Glassfish 4.1 server with a default configuration is running on TCP port 4848. No password is required to access it with the administrator account.

Action-Not Available
Vendor-epikurn/a
Product-epikurn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-31132
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.55%
||
7 Day CHG~0.00%
Published-05 Sep, 2023 | 21:19
Updated-11 Apr, 2025 | 14:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cacti Privilege Escalation

Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-The Cacti Group, Inc.Microsoft Corporation
Product-windowscacticacticacti
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-47574
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7.4||HIGH
EPSS-0.04% / 8.71%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 11:15
Updated-21 Jan, 2025 | 22:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.

Action-Not Available
Vendor-Fortinet, Inc.
Product-forticlientFortiClientWindowsforticlientwindows
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • Next
Details not found