Symantec Encryption Management Server 3.3.2 < 3.3.2 MP12 Multiple Vulnerabilities (SYM16-002)

This script is Copyright (C) 2016 Tenable Network Security, Inc.

Synopsis :

A security policy management application running on the remote host is
affected by multiple vulnerabilities.

Description :

The version of Symantec Encryption Management Server running on the
remote host is 3.3.2 prior to version 3.3.2 MP12. It is, therefore,
affected by multiple vulnerabilities :

- An unspecified flaw in the LDAP service allows a remote
attacker, via a crafted LDAP request, to gather
sensitive information about valid administrator accounts
on the server. (CVE-2015-8148)

- A denial of service exists in the LDAP service due to a
failure to properly validate user-supplied input. An
unauthenticated, remote attacker can exploit this, via
crafted request packets, to cause corrupted memory block
headers, leading to a SIGSEGV fault and resulting in a
service halt. (CVE-2015-8149)

- An unspecified flaw exists that is related to scheduling
commands to run via existing batch files, which normally
run with root privileges. A local attacker can exploit
this to gain elevated privileges on the server.

- A command injection vulnerability exists in the web user
interface due to a failure to properly sanitize certain
user-supplied input fields. An authenticated, remote
attacker can exploit this to run arbitrary commands with
elevated privileges on the underlying operating system.

See also :

Solution :

Upgrade to Symantec Encryption Management Server version 3.3.2 MP12 or

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.4
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 88903 ()

Bugtraq ID: 83268

CVE ID: CVE-2015-8148

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now