This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
An update management application installed on the remote Windows host
has a privilege escalation vulnerability.
The version of Symantec LiveUpdate Administrator (LUA) installed on
the remote host has a privilege escalation vulnerability. The
installation directory allows write access to the Everyone group. This
directory contains batch files that are periodically executed as
SYSTEM. A local, unprivileged attacker could exploit this by creating
or modifying files that will be executed as SYSTEM, resulting in
A partial fix for this issue was included in LUA 2.3.1, but it does
not mitigate all possible attack vectors.
See also :
Upgrade to Symantec LiveUpdate Administrator 2.3.2 or later.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true