Altiris AClient < 6.9.164 Multiple Local Vulnerabilities

high Nessus Plugin ID 31417

Synopsis

The remote Windows host has a program that is affected by multiple privilege escalation vulnerabilities.

Description

The version of the Altiris Client Agent (aclient) installed on the remote host reportedly is susceptible to a shatter attack that could allow a local user to elevate his or her privileges on the affected system.

In addition, the Altiris Deployment Solution reportedly stores the AClient password in system memory. By dumping system memory for AClient.exe, a local user could potentially recover the password and use that to gain access to the local agent admin interface, which in turn could allow for code execution with system level privileges.

Solution

Upgrade to Altiris Deployment Solution Agent 6.9.164 or later.

See Also

https://www.insomniasec.com/home

https://www.securityfocus.com/archive/1/497617/30/0/threaded

http://www.symantec.com/avcenter/security/Content/2008.03.10.html

http://www.symantec.com/avcenter/security/Content/2008.04.10.html

Plugin Details

Severity: High

ID: 31417

File Name: altiris_6_9_164.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 3/12/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-1473, CVE-2008-1754

BID: 28110, 28707

CWE: 264, 310

Secunia: 29319, 29771