exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lda-13.txt

lda-13.txt
Posted Sep 16, 2006
Authored by Deral Heiland | Site LayeredDefense.com

A format string vulnerability was discovered within Symantec AntiVirus Corporate Edition versions 10.0, 9.0, and 8.1. The vulnerability is due to improper processing of format strings within the Tamper Protection and Virus Alert Notification message fields.

tags | advisory, virus
advisories | CVE-2006-3454
SHA-256 | b88bed47963cead7cdf7ea06aa496167b920a7643fa9974268839386da323811

lda-13.txt

Change Mirror Download
==================================================
Layered Defense Advisory 13 September 2006
==================================================
1) Affected Software
Symantec AntiVirus Corporate Edition 10.0
Symantec AntiVirus Corporate Edition 9.0
Symantec AntiVirus Corporate Edition 8.1 ==================================================
2) Severity
Rating: Medium risk
Impact: Execution of arbitrary code, rights escalation and at a minimum, denial of service.
==================================================
3) Description of Vulnerability
A format string vulnerability was discovered within Symantec AntiVirus Corporate Edition. The vulnerability is due to improper processing of format strings within Tamper Protection and Virus Alert Notification message fields. A local user could replace the Tamper Protection and Virus Alert Notification messages with a specially crafted format string which could allow access to the process stack. If successfully exploited, this could allow the user to execute code of the attacker’s choice with elevated privileges, on the local system.
Other effected software identified by vendor:
Symantec Client Security 3.0
Symantec Client Security 2.x
Symantec Client Security 1.x

==================================================
4) Solution

Solutions to fix vulnerability are addressed within Symantec Advisory
http://www.symantec.com/avcenter/security/Content/2006.09.13.html
==================================================
5) Time Table
01/08/2006 – Reported Vulnerability to Vendor.
09/13/2006 – Vendor Public disclosure.
==================================================
6) Credits
Discovered by Deral Heiland, www.LayeredDefense.com ==================================================
7) References
CVE Reference:
CVE-2006-3454 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3454
==================================================
9) About Layered Defense
Layered Defense, Is a group of security professionals that work together on ethical Research, Testing and Training within the information security arena.
http://www.layereddefense.com
==================================================

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close