Symantec Endpoint Protection Client 12.1.x < 12.1 RU6 MP7 Local Privilege Escalation (SYM17-002)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The Symantec Endpoint Protection Client installed on the remote host
is affected by a privilege escalation vulnerability.

Description :

The version of Symantec Endpoint Protection (SEP) Client installed on
the remote host is 12.1.x prior to 12.1 RU6 MP7. It is, therefore,
affected by a local privilege escalation vulnerability in the SymEvent
driver due to improper validation of user-supplied input. A local
attacker can exploit this, via a specially crafted file, to manipulate
certain system calls, resulting in a denial of service condition, or
on 64-bit machines only, the possible execution of arbitrary code with
kernel-level privileges.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://www.nessus.org/u?0a546db1

Solution :

Upgrade to Symantec Endpoint Protection Client version 12.1 RU6 MP7
or later.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 4.6
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 97661 ()

Bugtraq ID: 96294

CVE ID: CVE-2016-9093

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now