lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 21 Apr 2006 23:37:04 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: [Symantec Security Advisor] Symantec Scan Engine Multiple
 Vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Title:   Symantec Scan Engine Multiple Vulnerabilities
Threat:  Moderate
Impact: Unauthorized access
Product: Symantec Scan Engine

Situation Overview: Three vulnerabilities have been discovered in the
Symantec Scan Engine.  Symantec Scan Engine is a TCP/IP server and
programming interface that enables third parties to incorporate support for
Symantec content scanning technologies into their proprietary applications.
This gateway-level product should not be confused with Symantec's desktop
product.

The Symantec Scan Engine fails to properly authenticate web-based user
logins. Anyone with knowledge of the underlying communication mechanism can
control the Scan Engine server.

Symantec Scan Engine uses a static private DSA key for SSL communications. 
This key cannot be changed by end users and is easily extracted. This opens
the product to a potential man-in-the-middle attack.

There is a vulnerability in Symantec Scan Engine that allows
unauthenticated remote users to download any file located under the
Symantec Scan Engine installation directory. For instance, the
configuration file, the scanning logs, and the current virus definitions
can all be accessed by any remote user using regular or specially crafted
HTTP requests.

Full Advisory Available at:
http://www.symantec.com/avcenter/security/Content/2006.04.21.html

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.5 (Build 5050)

iQEVAwUBREld0hy6+gFWHby+AQh/Egf+JPpE/dH15IrbltqmIh2I1mbKZiDB0njz
78HDOC568P1dQzTCifRvzuNd1MrcCIKSLdR0MuwHvEFvBw34E1Eda82cavgHLjOm
4kL3BOKRL8gdwKodlvAnBQBHaiGgrHWRMdJl1mwykouTO3UEeaH2+5MOdhN25LFn
3f1H4HbJep81Hq8w1//IWaUCyZk5lpwjVjk6T1K0kndOnST+YTUNDO14h8ZL8dKy
u4dSglOFNDNeth5QiTzHZCd8Ea4EJKK72jEAmhF0YqeOTC6CC0J0IT5UgYmEM1ov
vBTjk7clbAOiJzSpFjVsGm8ScwJ/2r9o9hh57Cvf5C8gv+8WWhWwzg==
=20KN
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ