lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070605191607.5258.qmail@securityfocus.com>
Date: 5 Jun 2007 19:16:07 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: SYM07-011 Symantec Reporting Server password disclosure

SYM07-011: Symantec Reporting Server Password Disclosure 
June 5, 2007

Risk Impact: Medium
Remote Access:	Yes
Local Access: Yes
Authentication Required:Yes
Exploit available:	No

Overview
The administrator password for Symantec Reporting Server could be disclosed after a failed login attempt. 

Affected Product:
Reporting Server from version 1.0.197.0 up to the solution

Solution: 
Reporting 1.0.224.0
Available with 	SAV 10.1 MR6  build 6000 (10.1.6.6000)  or later


Details

Symantec Reporting Server is an optional web application within the Symantec System Center console that can be used to be used to create reports about Symantec Client Security and Symantec AntiVirus products in an enterprise network.  Symantec was notified that a failed attempt to log in to the Reporting server could result in displaying a hashed version of the password.  An attacker could potentially use the hashed password to gain access to the Reporting Server database with administrator rights.  


Symantec Response

Symantec engineers confirmed that this vulnerability exists in the versions of Reporting Server included with Symantec Client Security 3.1 and SAV CE 10.1, as indicated in the table above.  Updates have been released to address the vulnerability. 

A successful attacker would gain access only to the Reporting Server database.  The attacker would not automatically have access to other programs on the computer, unless the same account and password are used for other programs.  As a best practice, the accounts created for managing Reporting Server should not use the same id and password as the users’ network login credentials. 

During the internal review of the issue, Symantec engineers also identified and fixed aseparate issue which could allow an attacker disable the authentication system for the SCS Reporting server. If successfully exploited, this could allow a remote attacker to bypass authentication and access the reporting database. 

Mitigation
 - Uninstall Reporting Server if it is not being used
-  Symantec Client Security Console and the Reporting Server interface should be restricted to trusted access only.  
-  Ensuring that the Console and Reporting are never visible external to the network greatly reduces opportunities for unauthorized remote access. 
-  User accounts for Reporting Server should be different than the user’s network login account.

Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue.   

As a part of normal best practices, users should keep vendor-supplied patches for all application software and operating systems up-to-date.  Symantec strongly recommends any affected customers update SAV Reporting immediately to protect against possible attempts to exploit this vulnerability. 

Credit
Symantec would like to thank Mikko Korppi for reporting this issue, and coordinating with us on the response. 

CVE
This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems.   The CVE initiative has assigned CVE-2007-3022 to this issue

Updates
Any future updates to this advisory, if required, will be posted on the Symantec Advisory page:
http://www.symantec.com/avcenter/security/Content/2007.06.05.html

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Symantec Product Security Team. 
________________________________________
Symantec takes the security and proper functionality of its products very
seriously. As founding members of the Organization for Internet Safety
(OISafety), Symantec follows the principles of responsible disclosure.
Symantec also subscribes to the vulnerability guidelines outlined by the
National Infrastructure Advisory Council (NIAC). Please contact
secure@...antec.com if you feel you have discovered security issue with a
Symantec product. 
Copyright (c) 2007 by Symantec Corp.

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRmW1Af9Lqygkbb6BAQifiwf+NfiU2gdBPuwRVUAQ/sxHEPCEq7E6TI8g
VXBzyVpjUla772Fcko3NPXr3pVAVsJCvEIH5rhiWWGfkVIvaOLBBRVoUr8PED6Nd
HaqlKAvj4PPPygRHGPjos/vaoI03N2MoIAJtjBVFqc/23Yz/0f5NDDjvj5pvzY19
Tf7XyfqYkShgxAqbu8VCb0x8s2Ge6RADFWRI7MHhRuRTkoRVPKoIGHQLuIE+b/S4
/Hu4FpU6QDEfeyat5h9ty9lWtD+6sPWIQcM9ieylRIxZ5JAKJuGSKVt7o8QjxLzg
EjVYtWcBLJAg1Ky/apFNIr6H9TPKwJkuXJHtp3qG+LFR9MQKk51U0w==
=N+kW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ