CVE-2010-0106

Severity

19%

Complexity

34%

Confidentiality

48%

The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.

The on-demand scanning in Symantec AntiVirus 10.0.x and 10.1.x before MR9, AntiVirus 10.2.x, and Client Security 3.0.x and 3.1.x before MR9, when Tamper protection is disabled, allows remote attackers to cause a denial of service (prevention of on-demand scanning) via "specific events" that prevent the user from having read access to unspecified resources.

CVSS 2.0 Base Score 1.9. CVSS Attack Vector: local. CVSS Attack Complexity: medium. CVSS Vector: (AV:L/AC:M/Au:N/C:N/I:N/A:P).

Overview

Type

Symantec

First reported 15 years ago

2010-02-19 17:30:00

Last updated 6 years ago

2018-10-30 16:25:00

Affected Software

Symantec Client Security 3.0

3.0

Symantec Client Security 3.0.0.359

3.0.0.359

Symantec Client Security 3.0.1.1000

3.0.1.1000

Symantec Client Security 3.0.1.1007

3.0.1.1007

Symantec Client Security 3.0.1.1008

3.0.1.1008

Symantec Client Security 3.0.2

3.0.2

Symantec Client Security 3.0.2.2000

3.0.2.2000

Symantec Client Security 3.0.2.2001

3.0.2.2001

Symantec Client Security 3.0.2.2010

3.0.2.2010

Symantec Client Security 3.0.2.2011

3.0.2.2011

Symantec Client Security 3.0.2.2020

3.0.2.2020

Symantec Client Security 3.0.2.2021

3.0.2.2021

Symantec Client Security 3.1.0.396

3.1.0.396

Symantec Client Security 3.1.0.401

3.1.0.401

Symantec Client Security 3.1.394

3.1.394

Symantec Client Security 3.1.400

3.1.400

Symantec Endpoint Protection Version 11.0

11.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.