发布时间 :2000-04-25 00:00:00
修订时间 :2008-09-10 15:04:05

[原文]pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap.


        pcAnywhere 8.x 和 9.0存在漏洞,远程攻击者可以通过TCP同步扫描,例如利用nmap触发拒绝服务。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:symantec:pcanywhere:9.2Symantec PCAnywhere 9.2
cpe:/a:symantec:pcanywhere:9.0Symantec PCAnywhere 9.0
cpe:/a:symantec:pcanywhere:8.0.1Symantec PCAnywhere 8.0.1
cpe:/a:symantec:pcanywhere:8.0.2Symantec PCAnywhere 8.0.2

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20000425 Denial of Service Against pcAnywhere.
(UNKNOWN)  XF  pcanywhere-tcpsyn-dos(4347)
(UNKNOWN)  BUGTRAQ  20010212 Re: Symantec pcAnywhere 9.0 DoS / Buffer Overflow
(UNKNOWN)  BUGTRAQ  20010211 Symantec pcAnywhere 9.0 DoS / Buffer Overflow

- 漏洞信息

中危 未知
2000-04-25 00:00:00 2010-12-02 00:00:00
        pcAnywhere 8.x 和 9.0存在漏洞,远程攻击者可以通过TCP同步扫描,例如利用nmap触发拒绝服务。

- 公告与补丁


- 漏洞信息 (19880)

Symantec pcAnywhere 8.0.1/8.0.2/9.0/9.2 Port Scan DoS Vulnerability (EDBID:19880)
windows dos
2000-04-25 Verified
0 Vacuum
N/A [点击下载]

Performing a TCP SYN or TCP connect scan on a host running Symantec pcAnywhere will cause the program to crash. Restarting the application is required in order to regain normal functionality.

nmap -sS target		

- 漏洞信息

Symantec pcAnywhere TCP SYN Scan Handling Remote DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Public Third-party Verified

- 漏洞描述

pcAnywhere contains a flaw that may allow a remote denial of service. The issue is triggered when a remote attacker sends excessive traffic to pcAnywhere related ports, and will result in loss of availability for the service.

- 时间线

2000-04-25 Unknow
2000-04-25 Unknow

- 解决方案

Upgrade to version 9.01 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者