[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <55BB6CBF.8060704@code-white.com>
Date: Fri, 31 Jul 2015 14:40:31 +0200
From: Markus Wulftange <markus.wulftange@...e-white.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] Symantec Endpoint Protection
Code White found several vulnerabilities in Symantec Endpoint Protection
(SEP), affecting versions 12.1 prior to 12.1 RU6 MP1.
SEP Manager (SEPM):
* CVE-2015-1486: Authentication Bypass
* CVE-2015-1487: Arbitrary File Write
* CVE-2015-1488: Arbitrary File Read
* CVE-2015-1489: Privilege Escalation
* CVE-2015-1490: Path Traversal
* CVE-2015-1491: SQL Injection
SEP clients:
* CVE-2015-1492: Binary Planting
Official Symantec advisory SYM15-007:
https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150730_00
An exploitation of these vulnerabilities effectively allow an
unauthenticated remote attacker the full compromise of both the SEPM
server as well as SEP clients running Windows. This can result in a full
compromise of an enterprise Windows domain.
Symantec provided the update 12.1 RU6 MP1 to address the issues.
For a full disclosure of some of the vulnerabilities, see:
http://codewhitesec.blogspot.com/2015/07/symantec-endpoint-protection.html
--
Markus Wulftange
Senior Penetration Tester
Code White GmbH
Magirus-Deutz-Straße 18
89077 Ulm
E-Mail markus.wulftange@...e-white.com
PGP C6D6 C18B BAB9 0089 6942 213D 7772 8552 E9F8 6F39
http://www.code-white.com
Code White GmbH
Sitz und Registergericht/Domicile and Register Court: Stuttgart,
HRB-Nr./Commercial Register No.: 749152
Geschäftsführung/Management: Dr. Helmut Mahler, Andreas Melzner, Lüder
Sachse
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists