exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Symantec Endpoint Protection 12.1 Bypass / Privilege Escalation / SQL Injection

Symantec Endpoint Protection 12.1 Bypass / Privilege Escalation / SQL Injection
Posted Aug 1, 2015
Authored by Markus Wulftange

Symantec Endpoint Protection versions 12.1 prior to 12.1 RU6 MP1 suffer from bypass, file write/read, privilege escalation, remote SQL injection, and traversal vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, bypass, file inclusion
advisories | CVE-2015-1492
SHA-256 | 3f5a3cfc1bc3b78c5647dfc0b895bed91d7231c04c302aa544d87d1b9315faff

Symantec Endpoint Protection 12.1 Bypass / Privilege Escalation / SQL Injection

Change Mirror Download
Code White found several vulnerabilities in Symantec Endpoint Protection
(SEP), affecting versions 12.1 prior to 12.1 RU6 MP1.

SEP Manager (SEPM):

* CVE-2015-1486: Authentication Bypass
* CVE-2015-1487: Arbitrary File Write
* CVE-2015-1488: Arbitrary File Read
* CVE-2015-1489: Privilege Escalation
* CVE-2015-1490: Path Traversal
* CVE-2015-1491: SQL Injection

SEP clients:

* CVE-2015-1492: Binary Planting

Official Symantec advisory SYM15-007:

https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150730_00


An exploitation of these vulnerabilities effectively allow an
unauthenticated remote attacker the full compromise of both the SEPM
server as well as SEP clients running Windows. This can result in a full
compromise of an enterprise Windows domain.

Symantec provided the update 12.1 RU6 MP1 to address the issues.


For a full disclosure of some of the vulnerabilities, see:

http://codewhitesec.blogspot.com/2015/07/symantec-endpoint-protection.html


--
Markus Wulftange
Senior Penetration Tester

Code White GmbH
Magirus-Deutz-Straße 18
89077 Ulm

E-Mail markus.wulftange@code-white.com
PGP C6D6 C18B BAB9 0089 6942 213D 7772 8552 E9F8 6F39

http://www.code-white.com

Code White GmbH
Sitz und Registergericht/Domicile and Register Court: Stuttgart,
HRB-Nr./Commercial Register No.: 749152
Geschäftsführung/Management: Dr. Helmut Mahler, Andreas Melzner, Lüder
Sachse


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close