Lucene search

K
symantecSymantec Security ResponseSMNTC-111246
HistoryDec 18, 2019 - 12:00 a.m.

Sysstat CVE-2019-19725 Memory Corruption Vulnerability

2019-12-1800:00:00
Symantec Security Response
www.symantec.com
10

Description

Sysstat is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. sysstat versions through 12.2.0 are vulnerable.

Technologies Affected

  • Sysstat Sysstat 10.0.0
  • Sysstat Sysstat 11.0.0
  • Sysstat Sysstat 12.0.0
  • Sysstat Sysstat 12.1.1
  • Sysstat Sysstat 12.1.7
  • Sysstat Sysstat 12.2.0
  • Sysstat Sysstat 4.0.0 .0
  • Sysstat Sysstat 4.0.1
  • Sysstat Sysstat 4.0.3
  • Sysstat Sysstat 4.0.7
  • Sysstat Sysstat 4.1.1
  • Sysstat Sysstat 4.1.2
  • Sysstat Sysstat 4.1.3
  • Sysstat Sysstat 4.1.4
  • Sysstat Sysstat 4.1.5
  • Sysstat Sysstat 4.1.6
  • Sysstat Sysstat 4.1.7
  • Sysstat Sysstat 5.0.1
  • Sysstat Sysstat 5.0.2
  • Sysstat Sysstat 7.1.6

Recommendations

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, run the application with the minimal amount of privileges required for functionality.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity including unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.

Do not accept or execute files from untrusted or unknown sources.
To reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.

Implement multiple redundant layers of security.
Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker’s ability to exploit this vulnerability to execute arbitrary code.

Updates are available. Please see the references or vendor advisory for more information.