[<prev] [next>] [day] [month] [year] [list]
Message-ID: <D52FCFAE57472647956CBAEDC08DA553B9CA2E@av-mail01.corp.int-eeye.com>
Date: Mon, 12 Jun 2006 15:25:03 -0700
From: "eEye Advisories" <Advisories@...e.com>
To: <full-disclosure@...ts.grok.org.uk>, <ntbugtraq@...ugtraq.com>,
<bugtraq@...urityfocus.com>, <vulnwatch@...nwatch.org>
Subject: [EEYEB-20060524] Symantec Remote Management Stack
Buffer Overflow
Symantec Remote Management Stack Buffer Overflow
Release Date:
June 12, 2006
Date Reported:
May 24, 2006
Severity:
High (Remote Code Execution)
Systems Affected:
Symantec AntiVirus 10.0.x for Windows (all versions)
Symantec AntiVirus 10.1.x for Windows (all versions)
Symantec Client Security 3.0.x for Windows (all versions)
Symantec Client Security 3.1.x for Windows (all versions)
Systems Not Affected:
Symantec AntiVirus 10.x.x for Macintosh
Symantec AntiVirus 10.x.x for Linux
Symantec AntiVirus 10.x.x for Wireless
Overview:
eEye Digital Security has discovered a vulnerability in the remote
management interface for Symantec AntiVirus 10.x and Symantec Client
Security 3.x, which could be exploited by an anonymous attacker in order
to execute arbitrary code with SYSTEM privileges on an affected system.
The management interface is typically enabled in enterprise settings and
listens on TCP port 2967 by default, for both server and client systems.
Although remote management traffic is typically SSL-encrypted, managed
systems will accept and process clear-text requests of the vulnerable
type.
Technical Details:
The remote management protocol communicated by the affected products is
a proprietary message-based protocol with two levels of encapsulation.
The outer layer comprises a message header indicating one of three
message types: 10, which designates a request to Rtvscan.exe, or 20 or
30, which mediate SSL negotiation. If SSL is established for a TCP
connection, subsequent traffic is encrypted although the plaintext is
still in the proprietary format.
The data of type-10 messages contains its own header and body which are
processed by Rtvscan.exe. This header features a command field which
specifies the operation to perform and dictates the format of the body
data.
The COM_FORWARD_LOG (0x24) command handler contains an improper use of
strncat that allows a 0x180-byte stack buffer to be overflowed with
arbitrary data. If the first string in the COM_FORWARD_LOG request body
contains a backslash, then one of the following two strncat calls will
be performed:
* If the string contains a comma but no double-quote:
strncat(dest, src, 0x17A - strlen(src));
* Otherwise:
strncat(dest, src, 0x17C - strlen(src));
If the length of the source string exceeds 0x17A or 0x17C characters
respectively, the arithmetic will underflow and result in a very large
copy size (since the copy size argument is of type size_t, which is
unsigned). This causes the entire source string to be appended to the
buffer, allowing the stack to be overwritten with up to 64KB of data in
which only null characters are prohibited.
Rtvscan.exe was compiled with the Visual Studio /GS security option
which institutes stack canary checks, but this security measure can be
bypassed by causing a very large overwrite and taking control of an
exception handler registration.
As a basic workaround against automated exploitation, the management
interface TCP port may be changed via the
"HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\VirusProtect6\CurrentVersion\
AgentIPPort" registry value in order to accomplish a very slight amount
of obfuscation. Remote management should continue to function even if
the new port numbers are not homogeneous across an enterprise.
Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink - Endpoint Vulnerability Prevention - preemptively protects from
this vulnerability.
Vendor Status:
Symantec has released patches for the affected products. For more
information, please consult Symantec security advisory SYM06-010:
http://www.symantec.com/avcenter/security/Content/2006.05.25.html
Note that the installation of one or more previous patches may be
required before the SYM06-010 patch can be applied.
This issue has been assigned CVE-2006-2630.
Credit:
Derek Soeder
Related Links:
Retina Network Security Scanner - Free Trial
(http://www.eeye.com/html/products/retina/index.html)
Blink Endpoint Vulnerability Prevention - Free Trial
(http://www.eeye.com/html/products/blink/index.html)
Greetings:
Symantec engineers, for very quickly producing a solid patch. Family
and friends. Anti-greets to copperhead snakes.
Copyright (c) 1998-2006 eEye Digital Security
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express
consent of eEye. If you wish to reprint the whole or any part of this
alert in any other medium excluding electronic medium, please email
alert@...e.com for permission.
Disclaimer
The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are no warranties, implied or express, with regard to this
information. In no event shall the author be liable for any direct or
indirect damages whatsoever arising out of or in connection with the use
or spread of this information. Any use of this information is at the
user's own risk.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists