ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [VulnWatch] [EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow



> -----Original Message-----
> From: eEye Advisories [mailto:Advisories@xxxxxxxx] 
> Sent: Tuesday, June 13, 2006 2:25 AM
> To: full-disclosure@xxxxxxxxxxxxxxxxx; 
> ntbugtraq@xxxxxxxxxxxxx; bugtraq@xxxxxxxxxxxxxxxxx; 
> vulnwatch@xxxxxxxxxxxxx
> Subject: [VulnWatch] [EEYEB-20060524] Symantec Remote 
> Management Stack Buffer Overflow
> Importance: High
> 
> Symantec Remote Management Stack Buffer Overflow
> 
> Release Date:
> June 12, 2006
> 
> Date Reported:
> May 24, 2006
> 
> Severity:
> High (Remote Code Execution)
> 
> Systems Affected:
> Symantec AntiVirus 10.0.x for Windows (all versions)
> Symantec AntiVirus 10.1.x for Windows (all versions)
> Symantec Client Security 3.0.x for Windows (all versions)
> Symantec Client Security 3.1.x for Windows (all versions)
> 
> Systems Not Affected:
> Symantec AntiVirus 10.x.x for Macintosh
> Symantec AntiVirus 10.x.x for Linux
> Symantec AntiVirus 10.x.x for Wireless
> 
> Overview:
> eEye Digital Security has discovered a vulnerability in the remote
> management interface for Symantec AntiVirus 10.x and Symantec Client
> Security 3.x, which could be exploited by an anonymous 
> attacker in order
> to execute arbitrary code with SYSTEM privileges on an 
> affected system.
> The management interface is typically enabled in enterprise 
> settings and
> listens on TCP port 2967 by default, for both server and 
> client systems.
> 
> Although remote management traffic is typically SSL-encrypted, managed
> systems will accept and process clear-text requests of the vulnerable
> type.
> 
> Technical Details:
> The remote management protocol communicated by the affected 
> products is
> a proprietary message-based protocol with two levels of encapsulation.
> The outer layer comprises a message header indicating one of three
> message types: 10, which designates a request to Rtvscan.exe, or 20 or
> 30, which mediate SSL negotiation.  If SSL is established for a TCP
> connection, subsequent traffic is encrypted although the plaintext is
> still in the proprietary format.
> 
> The data of type-10 messages contains its own header and body 
> which are
> processed by Rtvscan.exe.  This header features a command field which
> specifies the operation to perform and dictates the format of the body
> data.
> 
> The COM_FORWARD_LOG (0x24) command handler contains an improper use of
> strncat that allows a 0x180-byte stack buffer to be overflowed with
> arbitrary data.  If the first string in the COM_FORWARD_LOG 
> request body
> contains a backslash, then one of the following two strncat calls will
> be performed:
> 
>  * If the string contains a comma but no double-quote:
> 
>     strncat(dest, src, 0x17A - strlen(src));
> 
>  * Otherwise:
> 
>     strncat(dest, src, 0x17C - strlen(src));
> 
> If the length of the source string exceeds 0x17A or 0x17C characters
> respectively, the arithmetic will underflow and result in a very large
> copy size (since the copy size argument is of type size_t, which is
> unsigned).  This causes the entire source string to be appended to the
> buffer, allowing the stack to be overwritten with up to 64KB 
> of data in
> which only null characters are prohibited.
> 
> Rtvscan.exe was compiled with the Visual Studio /GS security option
> which institutes stack canary checks, but this security measure can be
> bypassed by causing a very large overwrite and taking control of an
> exception handler registration.
> 
> As a basic workaround against automated exploitation, the management
> interface TCP port may be changed via the
> "HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\VirusProtect6\Curre
> ntVersion> AgentIPPort" registry value in order to accomplish a very 
> slight amount
> of obfuscation.  Remote management should continue to function even if
> the new port numbers are not homogeneous across an enterprise.
> 
> Protection:
> Retina Network Security Scanner has been updated to identify this
> vulnerability.
> Blink - Endpoint Vulnerability Prevention - preemptively protects from
> this vulnerability.
> 
> Vendor Status:
> Symantec has released patches for the affected products.  For more
> information, please consult Symantec security advisory SYM06-010:
> http://www.symantec.com/avcenter/security/Content/2006.05.25.html
> 
> Note that the installation of one or more previous patches may be
> required before the SYM06-010 patch can be applied.
> 
> This issue has been assigned CVE-2006-2630.
> 
> Credit:
> Derek Soeder
> 
> Related Links:
> Retina Network Security Scanner - Free Trial
> (http://www.eeye.com/html/products/retina/index.html)
> Blink Endpoint Vulnerability Prevention - Free Trial
> (http://www.eeye.com/html/products/blink/index.html)
> 
> Greetings:
> Symantec engineers, for very quickly producing a solid patch.  Family
> and friends.  Anti-greets to copperhead snakes.
> 
> Copyright (c) 1998-2006 eEye Digital Security
> Permission is hereby granted for the redistribution of this alert
> electronically.  It is not to be edited in any way without express
> consent of eEye.  If you wish to reprint the whole or any part of this
> alert in any other medium excluding electronic medium, please email
> alert@xxxxxxxx for permission.
> 
> Disclaimer
> The information within this paper may change without notice.  Use of
> this information constitutes acceptance for use in an AS IS condition.
> There are no warranties, implied or express, with regard to this
> information.  In no event shall the author be liable for any direct or
> indirect damages whatsoever arising out of or in connection 
> with the use
> or spread of this information.  Any use of this information is at the
> user's own risk.
> 




 




Copyright © Lexa Software, 1996-2009.