Symantec AntiVirus Scan Engine Web Interface Multiple Remote Vulnerabilities

critical Nessus Plugin ID 21271

Synopsis

It is possible to take control of the remote scan engine.

Description

The remote host appears to be running Symantec Scan Engine.

This version of Scan Engine is vulnerable to several flaws that could allow a remote attacker to take control of the scan engine. The following flaws are present:

- Fixed HTTPS certificate key
- Configuration file retrieval (with administrator password hash)
- Possibility to change the administrator password

Solution

Upgrade to Scan Engine 5.1.0.7 or later.

Plugin Details

Severity: Critical

ID: 21271

File Name: symantec_scan_engine_multiple.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 4/24/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:symantec:antivirus_scan_engine

Exploit Ease: No exploit is required

Patch Publication Date: 4/21/2006

Vulnerability Publication Date: 4/21/2006

Reference Information

CVE: CVE-2006-0230, CVE-2006-0231, CVE-2006-0232

BID: 17637