Altiris AClient < 6.9.164 Multiple Local Vulnerabilities

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has a program that is affected by multiple
privilege escalation vulnerabilities.

Description :

The version of the Altiris Client Agent (aclient) installed on the
remote host reportedly is susceptible to a shatter attack that could
allow a local user to elevate his or her privileges on the affected
system.

In addition, the Altiris Deployment Solution reportedly stores the
AClient password in system memory. By dumping system memory for
AClient.exe, a local user could potentially recover the password and
use that to gain access to the local agent admin interface, which in
turn could allow for code execution with system level privileges.

See also :

http://www.insomniasec.com/advisories/ISVA-081020.1.htm
http://www.securityfocus.com/archive/1/497617/30/0/threaded
http://www.symantec.com/avcenter/security/Content/2008.03.10.html
http://www.symantec.com/avcenter/security/Content/2008.04.10.html

Solution :

Upgrade to Altiris Deployment Solution Agent 6.9.164 or later.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 31417 (altiris_6_9_164.nasl)

Bugtraq ID: 28110
28707

CVE ID: CVE-2008-1473
CVE-2008-1754

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now