|
|
|
|
| |
Credit:
The information has been provided by iDefense Labs.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=666 and http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=667
|
| |
Vulnerable Systems:
* Symantec Scan Engine version 5.1.2
Symantec Scan Engine RAR File Buffer Overflow Vulnerability
Remote exploitation of a stack based buffer overflow vulnerability in Symantec Scan Engine version 5.1.2 could allow an unauthenticated attacker to execute arbitrary code with the privileges of the scan engine process.
Symantec Scan Engine listens on TCP port 1344 to accept files for scanning using the Internet Content Adaptation Protocol (ICAP). If the service is sent a specially malformed RAR file, a stack-based buffer overflow will occur.
Analysis:
Exploitation allows remote unauthenticated attackers to execute arbitrary code with the privileges of the scan engine process. The scan engine can be configured to run either as a normal user or as root. In order to exploit this vulnerability, an attacker must be able to cause a malicious RAR file to be scanned by the Symantec Scan Engine. Normally, no authentication is required to reach the vulnerable code.
Vendor response:
Symantec has addressed this vulnerability by releasing updates for various versions of the Symantec Scan Engine. For more information, refer to their advisory at the following URL: http://www.symantec.com/avcenter/security/Content/2008.02.27.html
CVE Information:
CVE-2008-0309
Disclosure Timeline:
06/14/2007 - Initial vendor notification
06/14/2007 - Initial vendor response
02/26/2008 - Coordinated public disclosure
Symantec Scan Engine RAR File Denial of Service Vulnerability
Remote exploitation of a Denial of Service vulnerability in Symantec Scan Engine version 5.1.2 could allow an unauthenticated attacker to create a denial of service (DoS) condition.
Symantec Scan Engine listens on TCP port 1344 to accept files for scanning using the Internet Content Adaptation Protocol (ICAP). If the service is sent a malformed RAR file, the service will consume massive amounts of memory. This can result in a denial of service condition for the application and operating system.
Analysis:
Exploitation allows remote unauthenticated attackers to cause the process to consume excessive amounts memory. In order to exploit this vulnerability, an attacker must be able to cause a malicious RAR file to be scanned by the Symantec Scan Engine. Normally, no authentication is required to reach the vulnerable code.
Vendor response:
Symantec has addressed this vulnerability by releasing updates for various versions of the Symantec Scan Engine. For more information, refer to their advisory at the following URL: http://www.symantec.com/avcenter/security/Content/2008.02.27.html
CVE Information:
CVE-2008-0308
Disclosure Timeline:
06/14/2007 - Initial vendor notification
06/14/2007 - Initial vendor response
02/26/2008 - Coordinated public disclosure
|
|
|
|
|