[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070910151228.19996.qmail@securityfocus.com>
Date: 10 Sep 2007 15:12:28 -0000
From: secure@...antec.com
To: bugtraq@...urityfocus.com
Subject: Symantec Product Security: Symantec Device Driver Local Elevation
of Privilege
SYM07-024
September 05, 2007
Symantec SYMTDI.SYS Device Driver Local Denial of Service
Revision History: None
Risk Impact: Low
Remote Access: No
Local Access: Yes
Authentication Required: Yes, to the local system
Exploit available: No
Overview
Some versions of Symantec’s device driver SYMTDI.SYS contain a vulnerability which, if successfully exploited, could allow a local attacker to cause the system to crash.
Affected Products
Norton AntiSpam 2005
Norton AntiVirus 2005, 2006
Norton Internet Security 2005
Norton Personal Firewall 2005, 2006
Norton System Works 2005, 2006
Symantec AntiVirus Corporate Edition 10.0
Symantec AntiVirus Corporate Edition 10.1, prior to SAV 10.1 MR6 MP1
Symantec AntiVirus Corporate Edition 9, prior to SAV 9 MR6 MP1
Symantec Client Security 3.1, prior to SCS 3.1 MR6 MP1
Symantec Client Security 2.x, prior to SCS 2.0 MR6 MP1
Unaffected Products
Norton 360
Norton AntiBot
Norton Confidential
Norton AntiVirus 2007and later
Norton Internet Security 2007and later
Symantec AntiVirus Corporate Edition 10.2.x
Symantec AntiVirus for Linux 10.x
Details
Symantec was notified of a potential denial of service vulnerability in the device driver SYMTDI.SYS. A specially crafted IRP sent to an IOCTL handler function could allow memory to be overwritten because the address space was not properly validated in some versions of the driver. A potential attacker must be logged into the computer to attempt an exploit. A successful exploit of this vulnerability could potentially allow that user to crash their computer.
Symantec Response
Symantec engineers have verified that the vulnerability exists in the products listed in the Affected Products section above, and have provided updates for all affected products. Consumer (Norton) products can be updated by running LiveUpdate. Symantec AntiVirus Corporate Edition customers can obtain the update from the Symantec web site.
Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue.
Credit
This issue was reported by Matousec-Transparent.
References
This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-1476 to this issue.
SecurityFocus has assigned BID 22977 to this vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Symantec Product Security
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRuVg1/9Lqygkbb6BAQiy8gf/aQDO+uftL8+Ia+FLbnOuuEUzfR/LWBHn
SFSBw8hk38Gq4DAGMYeBI2Am74cUxjWQ5e3NqG4sQgHD2bfjTkrcPdMabiL8JaM9
j8TaCNBxgyClAcfI79dFinbgBTg4tNMfLbcLeg31gKV64WhQ962cfiZhbURXseS9
gdQMhVEDyyalFvpFFhtWkY+XigLMFeEMeMdjC77nw4jedwgQBS0FV4IAnGn8diHN
2yEHef2I4/pUj8JxHSV2DY5FudWaAc3TbdesBi5jVA/aXg2DOwHGrq05QRG1/qbp
/45TREnS+hw0w3xyGs1JbZH0vlqiWoWjwKkv+xrL46bJ7laCTVON3Q==
=Cd3j
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists