Unrated severityNVD Advisory· Published Nov 16, 2005· Updated Apr 16, 2026
CVE-2005-3566
CVE-2005-3566
Description
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Affected products
40cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*+ 25 more
- cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp1j:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_mp2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_p1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_beta:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:3.5_solaris_mp3:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_aix_beta:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_linux_beta:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_beta:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:cluster_server:4.0_solaris_mp1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:sanpoint_control_quickstart:3.5_solaris:*:*:*:*:*:*:*
cpe:2.3:a:symantec_veritas:storage_foundation:1.0_aix:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:a:symantec_veritas:storage_foundation:1.0_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:2.2_linux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:2.2_vmware_esx:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:3.0_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:3.4_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:3.5_hp-ux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:3.5_solaris:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:4.0_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:4.0_linux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation:4.0_solaris:*:*:*:*:*:*:*
cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_aix:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_aix:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_linux:*:*:*:*:*:*:*
- cpe:2.3:a:symantec_veritas:storage_foundation_cluster_file_system:4.0_solaris:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/17502nvdPatchVendor Advisory
- securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.htmlnvdPatchVendor Advisory
- securitytracker.com/idnvdPatch
- www.securityfocus.com/bid/15349nvdExploit
- marc.infonvd
- osvdb.org/20673nvd
- securityreason.com/securityalert/174nvd
- www.vupen.com/english/advisories/2005/2350nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/22986nvd
News mentions
0No linked articles in our index yet.