Symantec System Recovery 2011 imapi.dll Path Subversion Arbitrary DLL Injection Code Execution (SYM12-012)

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by a
code execution vulnerability.

Description :

The remote Windows host contains a version of Symantec System
Recovery 2011 earlier than Service Pack 2. As such, it is reportedly
affected by an insecure library loading vulnerability. If an attacker
can trick a user on the affected system into opening a specially
crafted file in the Granular Restore Option directory or the Recovery
Point Browser directory, this issue could be leveraged to execute
arbitrary code subject to the user's privileges.

See also :

http://www.nessus.org/u?fb107c6e

Solution :

Upgrade to Symantec System Recovery 2011 SP2 or later.

Risk factor :

Medium / CVSS Base Score : 4.4
(CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 60161 ()

Bugtraq ID: 54594

CVE ID: CVE-2012-0305

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now