Unrated severityNVD Advisory· Published Dec 22, 2010· Updated Apr 29, 2026
CVE-2010-3268
CVE-2010-3268
Description
The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.
Affected products
19cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*+ 16 more
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:rtm:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*
- cpe:2.3:a:intel:intel_alert_management_system:*:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- www.coresecurity.com/content/symantec-intel-handler-service-remote-dosnvdExploit
- secunia.com/advisories/42593nvdVendor Advisory
- www.vupen.com/english/advisories/2010/3206nvdVendor Advisory
- secunia.com/advisories/43099nvd
- www.securityfocus.com/archive/1/515191/100/0/threadednvd
- www.securityfocus.com/bid/45936nvd
- www.securitytracker.com/idnvd
- www.symantec.com/security_response/securityupdates/detail.jspnvd
- www.vupen.com/english/advisories/2011/0234nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/64028nvd
News mentions
0No linked articles in our index yet.