Lucene search

K
nessusThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.SYMANTEC_WV_6_4_1953.NASL
HistoryJan 30, 2014 - 12:00 a.m.

Symantec Workspace Virtualization 6.x < 6.4.1953 Local Privilege Escalation (SYM13-011)

2014-01-3000:00:00
This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
www.tenable.com
13

CVSS2

6.6

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.001

Percentile

26.3%

The remote Windows host is running a version of Symantec Workspace Virtualization 6.x prior to 6.4.1953. It is, therefore, affected by a local privilege escalation vulnerability due to a failure to sanitize user-supplied input. An attacker could potentially exploit this vulnerability to run arbitrary code with SYSTEM level privileges.

Note that the vulnerability is only exploitable if at least one virtual application layer is activated/enabled.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");


if (description)
{
  script_id(72219);
  script_version("1.3");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2013-4679");
  script_bugtraq_id(61349);

  script_name(english:"Symantec Workspace Virtualization 6.x < 6.4.1953 Local Privilege Escalation (SYM13-011)");
  script_summary(english:"Check Symantec Workspace Virtualization version");

  script_set_attribute(
    attribute:"synopsis",
    value:
"An application installed on the remote host is affected by a local
privilege escalation vulnerability."
  );
  script_set_attribute(
    attribute:"description",
    value:
"The remote Windows host is running a version of Symantec Workspace
Virtualization 6.x prior to 6.4.1953.  It is, therefore, affected by a
local privilege escalation vulnerability due to a failure to sanitize
user-supplied input.  An attacker could potentially exploit this
vulnerability to run arbitrary code with SYSTEM level privileges. 

Note that the vulnerability is only exploitable if at least one virtual
application layer is activated/enabled."
  );
  # https://support.symantec.com/en_US/article.SYMSA1279.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2c4bb2e9");
  # http://www.symantec.com/business/support/index?page=content&id=HOWTO85016
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2c3a6727");
  script_set_attribute(attribute:"solution", value:"Upgrade to version 6.4.1953 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/18");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/07/30");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/01/30");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:workspace_virtualization");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("symantec_wv_installed.nbin");
  script_require_keys("SMB/symantec_workspace_virtualization/path", "SMB/symantec_workspace_virtualization/version", "SMB/symantec_workspace_virtualization/active_app_layers");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

app_name = 'Symantec Workspace Virtualization';
version = get_kb_item_or_exit('SMB/symantec_workspace_virtualization/version');
path = get_kb_item_or_exit('SMB/symantec_workspace_virtualization/path');
active_app_layers = get_kb_item_or_exit('SMB/symantec_workspace_virtualization/active_app_layers');

if (active_app_layers < 1) audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);

fixed_version = '6.4.1953.0';
min_version = '6.0';

if (
  ver_compare(ver:version, fix:min_version, strict:FALSE) >= 0 &&
  ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1
)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    report =
    '\n  Path              : ' + path +
    '\n  Active App Layers : ' + active_app_layers +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fixed_version + '\n';

    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);

CVSS2

6.6

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:C/I:C/A:C

EPSS

0.001

Percentile

26.3%

Related for SYMANTEC_WV_6_4_1953.NASL