Panda AdminSecure Communications Agent < 4.50.0.10 Directory Traversal

critical Nessus Plugin ID 70683

Synopsis

The remote Windows host contains an application that is affected by a directory traversal vulnerability.

Description

The Panda AdminSecure Communications Agent software, which is used for centralized management of Panda Antivirus, installed on the remote Windows host contains a flaw in the handling of MESSAGE_FROM_REMOTE messages. The software does not properly sanitize inputs, allowing an attacker to craft a special message that allows traversing outside of a restricted path. This may allow a remote attacker to overwrite arbitrary files and execute remote code with SYSTEM privileges.

Solution

Upgrade to Panda AdminSecure hotfix 4_50_00_0032 or later and update all connected agents.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-13-250/

https://www.pandasecurity.com/usa/support/card?id=40081

Plugin Details

Severity: Critical

ID: 70683

File Name: panda_pagent_4_50_0_10.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 10/29/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:pandasecurity:panda_antivirus

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 10/16/2013

Vulnerability Publication Date: 10/16/2013

Reference Information

BID: 63195