exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Symantec-9-13-2006.txt

Symantec-9-13-2006.txt
Posted Sep 27, 2006
Site symantec.com

Symantec Security Advisory: Symantec AntiVirus and Symantec Client Security Elevation of Privilege: An elevation of privilege vulnerability in Symantec Client Security and Symantec AntiVirus Corporate Edition could potentially allow a local attacker to execute code with elevated privileges on the target machine.

tags | advisory, local
SHA-256 | 98818d0305a13c5b474bc35d8bfd29eb55ce0b988370d5284dcb1b7c980f86cf

Symantec-9-13-2006.txt

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Symantec AntiVirus and Symantec Client Security Elevation of Privilege
September 13, 2006

Overview
An elevation of privilege vulnerability in Symantec Client Security and
Symantec AntiVirus Corporate Edition could potentially allow a local
attacker to execute code with elevated privileges on the target machine.

Affected Products
Symantec AntiVirus Corporate Edition versions 10.0, 9.x, and 8.1
Symantec Client Security versions 3.0, 2.x, 1.x

Unaffected Products
Symantec AntiVirus Corporate Edition version 10.1
Symantec Client Security version 3.1
Norton product line

Details
Deral Heiland of Layered Defense notified Symantec of a format string
vulnerability within Symantec AntiVirus Corporate Edition. If successfully
exploited, the vulnerability could allow a local attacker to execute code
with elevated privileges on the local system.

In addition, Symantec engineers found a second format string vulnerability
in the alert notification process. This issue could allow a local user to
replace the alert notification message with a format string which could
cause potentially cause the Real Time Virus Scan service to crash when the
notification message is displayed following the detection of a malicious
file.


Symantec Response

Symantec engineers have verified that these vulnerabilities exist in the
product versions indicated, and have provided updates to address the issue.


Please refer to our advisory for any updates on this vulnerablity:
http://www.symantec.com/avcenter/security/Content/2006.09.13.html

Symantec Product Security

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)

iQEVAwUBRQ7x2By6+gFWHby+AQi3hwgAjJSJH5kmtrR/tknJQPetijsTPdjnOzr9
RckwDTCd4BQQfWgU4SBO6rerdhooEFQ0O2Th2VQ8kvaeuIf09wcrkOQB2x6IDdaQ
PXXdSsXsntQo/lzOLxxqQZplYaNPLCfk4NNsvpIHRVgsHLRYJF0CrD2vT6HF35OM
X864YzovNFT7Q0qTo0vmqxG58q+STXrR/+R3slKj6gj8xNsk3QMHU+Z7goOz9mKZ
VahzH55qc83/Id1rzk01omrt3L25V+lDLoHT7QCnGNdjJkcygLluN/jPedqQiWfr
a23G2k7bku1syK8zXq9o5OyyC9B+Th8C7pB9JmAUMC2dCZqmSbHFkg==
=aga/
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close