This script is Copyright (C) 2016 Tenable Network Security, Inc.
A security policy management application running on the remote host is
affected by multiple vulnerabilities.
The version of Symantec Encryption Management Server running on the
remote host is 3.3.2 prior to version 3.3.2 MP12. It is, therefore,
affected by multiple vulnerabilities :
- An unspecified flaw in the LDAP service allows a remote
attacker, via a crafted LDAP request, to gather
sensitive information about valid administrator accounts
on the server. (CVE-2015-8148)
- A denial of service exists in the LDAP service due to a
failure to properly validate user-supplied input. An
unauthenticated, remote attacker can exploit this, via
crafted request packets, to cause corrupted memory block
headers, leading to a SIGSEGV fault and resulting in a
service halt. (CVE-2015-8149)
- An unspecified flaw exists that is related to scheduling
commands to run via existing batch files, which normally
run with root privileges. A local attacker can exploit
this to gain elevated privileges on the server.
- A command injection vulnerability exists in the web user
interface due to a failure to properly sanitize certain
user-supplied input fields. An authenticated, remote
attacker can exploit this to run arbitrary commands with
elevated privileges on the underlying operating system.
See also :
Upgrade to Symantec Encryption Management Server version 3.3.2 MP12 or
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.4
Public Exploit Available : true