CVE-2010-0106 Details

CVE-2010-0106

Published: 2010-02-19
Last Modified: 2018-10-30
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.9/10
Exploit Score 3.4/10
Access Vector Local
Access Complexity Medium
Authentication None
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact Partial
Integrity Impact None
Vector String AV:L/AC:M/Au:N/C:N/I:N/A:P
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:symantec:antivirus:10.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.2.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.0.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:mp1:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:mr4:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:mr5:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1:mr7:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.0.1:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.4:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.4.1:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.5:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.5.1:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.6:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.6.1:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.1.7:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.2:*:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.2:mr2:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:antivirus:10.2:mr3:corporate:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0:mr1:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0:mr2:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1:mr4:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1:mr5:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1:mr7:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:* Yes - -
References

http://osvdb.org/62414
http://secunia.com/advisories/38653
http://www.securityfocus.com/bid/38219
http://www.securitytracker.com/id?1023621
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_00
http://www.vupen.com/english/advisories/2010/0410
https://exchange.xforce.ibmcloud.com/vulnerabilities/56354

CVE ID
CVE-2010-0106
Published
2010-02-19
Modified
2018-10-30
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.