Panda AdminSecure Communications Agent < 4.50.0.10 Directory Traversal

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by a
directory traversal vulnerability.

Description :

The Panda AdminSecure Communications Agent software, which is used for
centralized management of Panda Antivirus, installed on the remote
Windows host contains a flaw in the handling of MESSAGE_FROM_REMOTE
messages. The software does not properly sanitize inputs, allowing an
attacker to craft a special message that allows traversing outside of a
restricted path. This may allow a remote attacker to overwrite
arbitrary files and execute remote code with SYSTEM privileges.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-250/
http://www.pandasecurity.com/enterprise/support/card?id=40081

Solution :

Upgrade to Panda AdminSecure hotfix 4_50_00_0032 or later and update
all connected agents.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 70683 ()

Bugtraq ID: 63195

CVE ID: