Lucene search

K
saintSAINT CorporationSAINT:92214AE45747569258A9FE4CBCADA052
HistoryFeb 23, 2011 - 12:00 a.m.

Symantec Alert Management System Intel Alert Handler modem string buffer overflow

2011-02-2300:00:00
SAINT Corporation
my.saintcorporation.com
20

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.954 High

EPSS

Percentile

99.3%

Added: 02/23/2011
CVE: CVE-2010-0110
BID: 45936

Background

The Symantec Alert Management System 2 (AMS2) is used by multiple Symantec products. It includes an Intel Alert Handler service (hndlrsvc.exe). This service handles messages forwarded to it by the Alert Originator Manager, which listens on port 38292/TCP.

Problem

A buffer overflow vulnerability in the pagehndl.dll module allows a remote attacker to execute arbitrary commands by sending a long, specially crafted modem string to the Intel Alert Handler.

Resolution

Apply the patch referenced in SYM11-002.

References

<http://www.zerodayinitiative.com/advisories/ZDI-11-030/&gt;

Limitations

Exploit works on Symantec System Center 10.1.8.8000 on Windows Server 2003 SP2 with patches KB956802 and KB956572.

Platforms

Windows

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.954 High

EPSS

Percentile

99.3%