Lucene search

K
saintSAINT CorporationSAINT:A43C0E141CCD19B97F31A8ED2BB97B74
HistoryDec 01, 2011 - 12:00 a.m.

Symantec Alert Management System AMSSendAlertAck Buffer Overflow

2011-12-0100:00:00
SAINT Corporation
my.saintcorporation.com
18

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.954 High

EPSS

Percentile

99.3%

Added: 12/01/2011
CVE: CVE-2010-0110
BID: 45936
OSVDB: 72623

Background

The Symantec Alert Management System 2 (AMS2) is used by multiple Symantec products. It includes an Intel Alert Handler service (**hndlrsvc.exe**). This service handles messages forwarded to it by the Alert Originator Manager (**msgsys.exe**), which listens on port 38292/TCP.

Problem

A stack buffer overflow vulnerability in the **AMSLIB.dll** module of the Intel Alert Handler service allows a remote attacker to execute arbitrary commands by sending a long, specially crafted string to the Alert Originator Manager.

Resolution

Apply the patch referenced in SYM11-002.

References

<http://www.zerodayinitiative.com/advisories/ZDI-11-028/&gt;

Limitations

Exploit works on Symantec System Center 10.1.8.8000 on Microsoft Windows Server 2003 SP2 English (DEP OptOut) with KB956802 and KB2393802.

Platforms

Windows Server 2003

7.9 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:N/C:C/I:C/A:C

0.954 High

EPSS

Percentile

99.3%