lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070910151228.19996.qmail@securityfocus.com>
Date: 10 Sep 2007 15:12:28 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: Symantec Product Security: Symantec Device Driver Local Elevation
 of Privilege

SYM07-024 
September 05, 2007 
Symantec SYMTDI.SYS Device Driver Local Denial of Service 
Revision History: None 

Risk Impact: Low 

Remote Access: No 
Local Access: Yes 
Authentication Required: Yes, to the local system 
Exploit available: No 


Overview
Some versions of Symantec’s device driver SYMTDI.SYS contain a vulnerability which, if successfully exploited, could allow a local attacker to cause the system to crash. 

Affected Products 
Norton AntiSpam 2005 
Norton AntiVirus 2005, 2006 
Norton Internet Security 2005
Norton Personal Firewall 2005, 2006 
Norton System Works 2005, 2006 
Symantec AntiVirus Corporate Edition 10.0 
Symantec AntiVirus Corporate Edition 10.1, prior to SAV 10.1 MR6 MP1 
Symantec AntiVirus Corporate Edition 9, prior to SAV 9 MR6 MP1  
Symantec Client Security  3.1, prior to SCS 3.1 MR6 MP1 
Symantec Client Security 2.x, prior to SCS 2.0 MR6 MP1 


Unaffected Products 

Norton 360 
Norton AntiBot
Norton Confidential 
Norton AntiVirus 2007and later
Norton Internet Security 2007and later 
Symantec AntiVirus Corporate Edition 10.2.x
Symantec AntiVirus for Linux 10.x 


Details
Symantec was notified of a potential denial of service vulnerability in the device driver SYMTDI.SYS. A specially crafted IRP sent to an IOCTL handler function could allow memory to be overwritten because the address space was not properly validated in some versions of the driver. A potential attacker must be logged into the computer to attempt an exploit. A successful exploit of this vulnerability could potentially allow that user to crash their computer. 

Symantec Response
Symantec engineers have verified that the vulnerability exists in the products listed in the Affected Products section above, and have provided updates for all affected products. Consumer (Norton) products can be updated by running LiveUpdate.  Symantec AntiVirus Corporate Edition customers can obtain the update from the Symantec web site. 

Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue. 

Credit
This issue was reported by Matousec-Transparent. 

References
This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-1476 to this issue. 
SecurityFocus has assigned BID 22977 to this vulnerability. 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Symantec Product Security

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRuVg1/9Lqygkbb6BAQiy8gf/aQDO+uftL8+Ia+FLbnOuuEUzfR/LWBHn
SFSBw8hk38Gq4DAGMYeBI2Am74cUxjWQ5e3NqG4sQgHD2bfjTkrcPdMabiL8JaM9
j8TaCNBxgyClAcfI79dFinbgBTg4tNMfLbcLeg31gKV64WhQ962cfiZhbURXseS9
gdQMhVEDyyalFvpFFhtWkY+XigLMFeEMeMdjC77nw4jedwgQBS0FV4IAnGn8diHN
2yEHef2I4/pUj8JxHSV2DY5FudWaAc3TbdesBi5jVA/aXg2DOwHGrq05QRG1/qbp
/45TREnS+hw0w3xyGs1JbZH0vlqiWoWjwKkv+xrL46bJ7laCTVON3Q==
=Cd3j
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ