Symantec LiveUpdate Administrator Insecure Permissions Local Privilege Escalation (credentialed check)

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.

Synopsis :

An update management application installed on the remote Windows host
has a privilege escalation vulnerability.

Description :

The version of Symantec LiveUpdate Administrator (LUA) installed on
the remote host has a privilege escalation vulnerability. The
installation directory allows write access to the Everyone group. This
directory contains batch files that are periodically executed as
SYSTEM. A local, unprivileged attacker could exploit this by creating
or modifying files that will be executed as SYSTEM, resulting in
privilege escalation.

A partial fix for this issue was included in LUA 2.3.1, but it does
not mitigate all possible attack vectors.

See also :

Solution :

Upgrade to Symantec LiveUpdate Administrator 2.3.2 or later.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 59193 ()

Bugtraq ID: 53903

CVE ID: CVE-2012-0304

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now