Symantec Endpoint Protection Manager < 12.1 RU6 Multiple Vulnerabilities (SYM15-005)

medium Nessus Plugin ID 84368

Synopsis

The version of Symantec Endpoint Protection Manager installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Symantec Endpoint Protection Manager (SEPM) installed on the remote host is prior to 12.1 RU6. It is, therefore, affected by the following vulnerabilities :

- A DLL injection vulnerability exists due to improper path restrictions when loading DLLs. An authenticated, local attacker can exploit this to insert malicious DLL files, resulting in the execution of arbitrary code with system permissions. (CVE-2014-9227)

- A denial of service vulnerability exists due to a deadlock condition in the 'sysplant.sys' file. A local attacker can exploit this by using a specially formatted call to cause the Windows system to be unable to fully shut down. Resolution of this condition requires a hard power cycle to restart the system. (CVE-2014-9228)

- A blind SQL injection vulnerability exists due to the improper validation of input to scripts used by the management console. An authenticated, remote attacker can exploit this, using arbitrary SQL queries, to access or modify data in the back-end database. (CVE-2014-9229)

Solution

Upgrade to Symantec Endpoint Protection Manager 12.1 RU6 or later.

See Also

http://www.nessus.org/u?b525a4b4

Plugin Details

Severity: Medium

ID: 84368

File Name: symantec_endpoint_prot_mgr_sym15-005.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 6/24/2015

Updated: 11/22/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2014-9229

Vulnerability Information

CPE: cpe:/a:symantec:endpoint_protection_manager

Required KB Items: installed_sw/Symantec Endpoint Protection Manager

Exploit Ease: No known exploits are available

Patch Publication Date: 6/17/2015

Vulnerability Publication Date: 6/17/2015

Reference Information

CVE: CVE-2014-9227, CVE-2014-9228, CVE-2014-9229

BID: 75202, 75203, 75204