Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2005-3566
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-16 Nov, 2005 | 07:42
Updated At-03 Apr, 2025 | 01:03

Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:L/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

symantec_veritas
symantec_veritas
>>cluster_server>>2.2
cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>2.2_linux
cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>2.2_linux_mp1p1
cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>2.2_mp1
cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>2.2_mp2
cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5
cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_aix
cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_hp-ux
cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_hp-ux_update_1
cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_hp-ux_update_2
cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_mp1
cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_mp1j
cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1j:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_mp2
cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp2:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_p1
cpe:2.3:a:symantec_veritas:cluster_server:3.5_p1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_solaris
cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_solaris_beta
cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_beta:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_solaris_mp1
cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_solaris_mp2
cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp2:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>3.5_solaris_mp3
cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp3:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_aix
cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_aix_beta
cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix_beta:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_linux
cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_linux_beta
cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux_beta:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_solaris
cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_solaris_beta
cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_beta:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>cluster_server>>4.0_solaris_mp1
cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_mp1:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>sanpoint_control_quickstart>>3.5_solaris
cpe:2.3:a:symantec_veritas:sanpoint_control_quickstart:3.5_solaris:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>1.0_aix
cpe:2.3:a:symantec_veritas:storage_foundation:1.0_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>2.2_linux
cpe:2.3:a:symantec_veritas:storage_foundation:2.2_linux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>2.2_vmware_esx
cpe:2.3:a:symantec_veritas:storage_foundation:2.2_vmware_esx:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>3.0_aix
cpe:2.3:a:symantec_veritas:storage_foundation:3.0_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>3.4_aix
cpe:2.3:a:symantec_veritas:storage_foundation:3.4_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>3.5_hp-ux
cpe:2.3:a:symantec_veritas:storage_foundation:3.5_hp-ux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>3.5_solaris
cpe:2.3:a:symantec_veritas:storage_foundation:3.5_solaris:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>4.0_aix
cpe:2.3:a:symantec_veritas:storage_foundation:4.0_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>4.0_linux
cpe:2.3:a:symantec_veritas:storage_foundation:4.0_linux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation>>4.0_solaris
cpe:2.3:a:symantec_veritas:storage_foundation:4.0_solaris:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation_cluster_file_system>>4.0_aix
cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_aix:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation_cluster_file_system>>4.0_linux
cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_linux:*:*:*:*:*:*:*
symantec_veritas
symantec_veritas
>>storage_foundation_cluster_file_system>>4.0_solaris
cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_solaris:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=113199516516880&w=2cve@mitre.org
N/A
http://osvdb.org/20673cve@mitre.org
N/A
http://secunia.com/advisories/17502cve@mitre.org
Patch
Vendor Advisory
http://securityreason.com/securityalert/174cve@mitre.org
N/A
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.htmlcve@mitre.org
Patch
Vendor Advisory
http://securitytracker.com/id?1015169cve@mitre.org
Patch
http://www.securityfocus.com/bid/15349cve@mitre.org
Exploit
http://www.vupen.com/english/advisories/2005/2350cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/22986cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=113199516516880&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/20673af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/17502af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securityreason.com/securityalert/174af854a3a-2127-422b-91ae-364da2661108
N/A
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://securitytracker.com/id?1015169af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/bid/15349af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2005/2350af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/22986af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found