| CVE ID | CVE-2010-3719 | 
| CVSS SCORE | 8.5, AV:N/AC:M/Au:S/C:C/I:C/A:C | 
| AFFECTED VENDORS | Symantec | 
| AFFECTED PRODUCTS | IM Manager | 
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10776']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is required to exploit this vulnerability in that a logged in user must be coerced into visiting a malicious link. The specific flaw exists within the ScheduleTask method exposed by the IMAdminSchedTask.asp page hosted on the web interface. This function does not properly sanitize user input from a POST variable before passing it to an eval call. An attacker can abuse this to inject and execute arbitrary ASP under the context of the user visiting the malicious link. | 
| ADDITIONAL DETAILS | Symantec has issued an update to correct this vulnerability. More details can be found at: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110131_00 | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | Andrea Micalizzi aka rgod |