Symantec Corp Quotes (3 Quotes)


    An attacker may leverage these issues to carry out a denial-of-service attack or execute arbitrary code on an affected computer with the privileges of the user viewing a malicious image. An attacker may gain system privileges if an administrator views the malicious file. Local code execution may also facilitate a complete compromise.

    Active exploitation of this issue has been, and continues to be, observed. A primitive instant messenger worm has been observed that employs this vulnerability as a propagation vector. Additionally, there are reports that exploits for this issue are getting spammed to e-mail addresses. It is believed that exploitation of this issue will continue to increase.

    Successful exploitation of this overflow condition could possibly allow a malicious attacker to create a denial of service disrupting backup systems or potentially allow execution of arbitrary code with elevated privileges on a targeted system.


    More Symantec Corp Quotations (Based on Topics)


    Service - View All Symantec Corp Quotations

    Related Authors


    - - - - - - - - - - - - - - - - - - - -


Authors (by First Name)

A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Other Inspiring Sections