Lucene search

K
nessusThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.SYMANTEC_ENDPOINT_PROT_MGR_SYM14-015.NASL
HistoryNov 10, 2014 - 12:00 a.m.

Symantec Endpoint Protection Manager < 12.1 RU5 Multiple Vulnerabilities (SYM14-015)

2014-11-1000:00:00
This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
www.tenable.com
24

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.05

Percentile

92.9%

The version of Symantec Endpoint Protection Manager (SEPM) installed on the remote host is 12.1 prior to 12.1 RU5. It is, therefore, affected by the following vulnerabilities :

  • An XML external entity (XXE) injection vulnerability due to improper validation of XML external entities. A remote attacker, impersonating the input source of external information or updates, can access restricted data or leverage additional management console functionality using specially crafted XML data.
    (CVE-2014-3437)

  • A reflected cross-site scripting vulnerability due to improper validation of user-supplied input to the ‘ErrorMsg’ parameter in ‘SSO-Error.jsp’. This allows a remote attacker, with a specially crafted request, to execute arbitrary script code within the browser / server trust relationship. (CVE-2014-3438)

  • An arbitrary file write vulnerability in the ‘ConsoleServlet’ due to improper filtering of user-supplied data to the logging component. This allows a remote attacker to write arbitrary code to the log file or disk, potentially causing a denial of service or unauthorized elevated access.
    (CVE-2014-3439)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(79083);
  script_version("1.8");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2014-3437", "CVE-2014-3438", "CVE-2014-3439");
  script_bugtraq_id(70843, 70844, 70845);
  script_xref(name:"EDB-ID", value:"35181");

  script_name(english:"Symantec Endpoint Protection Manager < 12.1 RU5 Multiple Vulnerabilities (SYM14-015)");
  script_summary(english:"Checks the SEPM version.");

  script_set_attribute(attribute:"synopsis", value:
"The version of Symantec Endpoint Protection Manager installed on the
remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Symantec Endpoint Protection Manager (SEPM) installed
on the remote host is 12.1 prior to 12.1 RU5. It is, therefore,
affected by the following vulnerabilities :

  - An XML external entity (XXE) injection vulnerability due
    to improper validation of XML external entities. A
    remote attacker, impersonating the input source of
    external information or updates, can access restricted
    data or leverage additional management console
    functionality using specially crafted XML data.
    (CVE-2014-3437)

  - A reflected cross-site scripting vulnerability due to
    improper validation of user-supplied input to the
    'ErrorMsg' parameter in 'SSO-Error.jsp'. This allows a
    remote attacker, with a specially crafted request, to
    execute arbitrary script code within the browser /
    server trust relationship. (CVE-2014-3438)

  - An arbitrary file write vulnerability in the
    'ConsoleServlet' due to improper filtering of
    user-supplied data to the logging component. This allows
    a remote attacker to write arbitrary code to the log
    file or disk, potentially causing a denial of
    service or unauthorized elevated access.
    (CVE-2014-3439)");
  # https://support.symantec.com/en_US/article.SYMSA1304.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2ea8ce99");
  script_set_attribute(attribute:"solution", value:"Upgrade to Symantec Endpoint Protection Manager 12.1.5 (RU5) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/11/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/11/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:endpoint_protection_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("symantec_endpoint_prot_mgr_installed.nasl");
  script_require_keys("SMB/sep_manager/path", "SMB/sep_manager/ver");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

display_ver = get_kb_item_or_exit('SMB/sep_manager/ver');
path = get_kb_item_or_exit('SMB/sep_manager/path');

if (display_ver !~ "^12\.") audit(AUDIT_INST_PATH_NOT_VULN, 'Symantec Endpoint Protection Manager', display_ver, path);

fixed_ver = '12.1.5337.5000';

if (ver_compare(ver:display_ver, fix:fixed_ver, strict:FALSE) == -1)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : '+ path +
      '\n  Installed version : '+ display_ver +
      '\n  Fixed version     : '+ fixed_ver +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, 'Symantec Endpoint Protection Manager', display_ver, path);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.05

Percentile

92.9%