Lucene search

K
nessusThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.SYMANTEC_DS_ACLIENT_6_9.NASL
HistoryMar 03, 2015 - 12:00 a.m.

Symantec Deployment Solution AClient <= 6.9 Buffer Overflow

2015-03-0300:00:00
This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
13

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

27.2%

The Symantec Deployment Solution AClient installed on the remote host is version 6.9 or prior. It is, therefore, affected by a buffer overflow vulnerability that is triggered when handling an IOCTL. A local attacker can exploit this to gain elevated privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(81600);
  script_version("1.6");
  script_cvs_date("Date: 2019/11/22");

  script_cve_id("CVE-2014-7286");
  script_bugtraq_id(71727);

  script_name(english:"Symantec Deployment Solution AClient <= 6.9 Buffer Overflow");
  script_summary(english:"Checks the version of Symantec Deployment Solution AClient.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by a buffer
overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"The Symantec Deployment Solution AClient installed on the remote host
is version 6.9 or prior. It is, therefore, affected by a buffer
overflow vulnerability that is triggered when handling an IOCTL. A
local attacker can exploit this to gain elevated privileges.");
  # https://support.symantec.com/en_US/article.SYMSA1307.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9f646397");
  script_set_attribute(attribute:"solution", value:
"Disable AClient and use DAgent instead.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-7286");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:deployment_solution");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("symantec_ds_client_service_detect.nbin");
  script_require_keys("SMB/Registry/Enumerated", "SMB/WindowsVersion", "installed_sw/Symantec Deployment Solution Client");
  script_require_ports(139, 445);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");

windows_version = get_kb_item_or_exit("SMB/WindowsVersion");
if (windows_version !~ "^5\.[12]$") audit(AUDIT_OS_NOT, "Windows XP/2003");

app = "Symantec Deployment Solution Client";
install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
ver     = install['version'];
path    = install['path'];
client  = install['Client Type'];

port = get_kb_item('SMB/transport');
if (!port) port = 445;

# Version 6.9 and below are vulnerable
if ( client == "AClient" && ver_compare(ver:ver, fix:'6.9', strict:FALSE) <= 0 )
{
  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : ' + path +
      '\n  Client type       : ' + client +
      '\n  Installed version : ' + ver +
      '\n  Fixed version     : See vendor advisory.' +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port:port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app + ' (' + client + ')', ver, path);
VendorProductVersionCPE
symantecdeployment_solutioncpe:/a:symantec:deployment_solution

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

27.2%

Related for SYMANTEC_DS_ACLIENT_6_9.NASL