Symantec LiveUpdate Administrator Insecure Permissions Local Privilege Escalation (credentialed check)

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

An update management application installed on the remote Windows host
has a privilege escalation vulnerability.

Description :

The version of Symantec LiveUpdate Administrator (LUA) installed on
the remote host has a privilege escalation vulnerability. The
installation directory allows write access to the Everyone group. This
directory contains batch files that are periodically executed as
SYSTEM. A local, unprivileged attacker could exploit this by creating
or modifying files that will be executed as SYSTEM, resulting in
privilege escalation.

A partial fix for this issue was included in LUA 2.3.1, but it does
not mitigate all possible attack vectors.

See also :

https://www.tenable.com/security/research/tra-2012-04
http://www.nessus.org/u?f93f8d81

Solution :

Upgrade to Symantec LiveUpdate Administrator 2.3.2 or later.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 59193 ()

Bugtraq ID: 53903

CVE ID: CVE-2012-0304

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now