Lucene search

K
saintSAINT CorporationSAINT:C23B83741EBACB4021AE8BF15D522878
HistoryOct 02, 2012 - 12:00 a.m.

Symantec Messaging Gateway Default SSH Password

2012-10-0200:00:00
SAINT Corporation
download.saintcorporation.com
25

EPSS

0.19

Percentile

96.3%

Added: 10/02/2012
CVE: CVE-2012-3579
BID: 55143
OSVDB: 85028

Background

Symantec Messaging Gateway is an email virus protection appliance that also provides antispam protection.

Problem

Symantec Messaging Gateway versions before 10.0 have a default password for the “support” account, which can be used to login remotely to the SSH service, and then gain privileged access.

Resolution

Upgrade to Symantec Messaging Gateway 10.0 or higher.

References

[http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2012&amp;suid=20120827_00 ](<http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00
>)

Limitations

Exploit works against Symantec Messaging Gateway 9.5.3-3 on platform CentOS Project CentOS 5.0 with Exec-Shield Enabled.

The OpenSSH client must be installed on the SAINTexploit host.

Platforms

Linux