CVE-2009-1430

Symantec Antivirus < 9.0 - Memory Corruption

Title source: rule
STIX 2.1

Description

Multiple stack-based buffer overflows in IAO.EXE in the Intel Alert Originator Service in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allow remote attackers to execute arbitrary code via (1) a crafted packet or (2) data that ostensibly arrives from the MsgSys.exe process.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16826
metasploit WORKING POC GOOD
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/antivirus/symantec_iao.rb

Scores

EPSS 0.6572
EPSS Percentile 98.5%

Details

CWE
CWE-119
Status published
Products (36)
symantec/antivirus
symantec/antivirus 10.0
symantec/antivirus 10.0.1
symantec/antivirus 10.0.1.1
symantec/antivirus 10.0.2
symantec/antivirus 10.0.2.1
symantec/antivirus 10.0.2.2
symantec/antivirus 10.0.3
symantec/antivirus 10.0.4
symantec/antivirus 10.0.5
... and 26 more
Published Apr 29, 2009
Tracked Since Feb 18, 2026