A dynamic link library (dll) in the Symantec Endpoint Protection Manager (SEPM) 12.1.x server and Symantec Protection Center (SPC) 12.0.x Small Business Edition server does not properly validate all external input. This could potentially result in a buffer overflow and remote code execution with application privileges on the system that is hosting the management server.
Product
|
Version
|
Build
|
Solution(s)
—|—|—|—
Symantec Endpoint Protection Manager (SEPM) Console
|
12.1.x
|
All
|
Upgrade to SEP 12.1.3 (RU3)
Symantec Endpoint Protection Center (SPC) Small Business Edition Console
|
12.0.x
|
All
|
Migrate to SEP 12.1.3 (RU3)
Products Not Affected
Product
|
Version
—|—
Symantec Endpoint Protection Manager
|
11.0.x
CVSS2
Base Score
|
Impact
|
Exploitability
|
CVSS2 Vector
—|—|—|—
SEPM/SPC Secar.dll Buffer Overflow - High
7.9
|
10
|
5.5
|
AV:A/AC:M/AU:N/C:C/I:C/A:C
CVE
|
BID
|
Description
—|—|—
CVE-2013-1612
|
BID 60542
|
SEPM/SPC Secars.dll Buffer Overflow Remote Code Execution
Details
Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) 12.1.x and Symantec Endpoint Protection Center (SPC) 12.0.x Small Business Edition. Insufficient bounds checking is done on external input by the secars.dll which could result in overflowing the existing buffer and possible remote code execution on the server if successfully exploited. This could enable an authorized network user or an unauthorized individual who can gain access to the network to attempt to leverage this issue to elevate privileges on the SEPM or SPC server via the client/server comms port. In a recommended installation, the Symantec Endpoint Protection Manager/SPC server should not be accessible external to the network.
Symantec is not aware of any customers affected by this issue or any malicious attempts to exploit this issue.
Symantec Response
Symantec product engineers verified the reported issue and that it is resolved in the Symantec Endpoint Protection 12.1.3 (RU3) release.
Update Information
Updates are available through customers’ normal support/download locations.
Mitigations
Symantec Security Response will release IPS signature 26667 “Web Attack: Symantec Endpoint Remote Code Exec” that detects and blocks attempts to exploit this issue. Signatures are available through normal Symantec updates.
Best Practices
Symantec strongly recommends, as part of normal best practices:
Symantec credits Jerome Nokin, Verizon Enterprise Solutions (GCIS Threat and Vulnerability Management) for discovering this vulnerability and Thierry Zoller, Verizon Enterprise Solutions (GCIS Threat and Vulnerability Management) for reporting and coordinating this issue with us while it was resolved.
BID: Security Focus, http://www.securityfocus.com, has assigned Bugtraq IDs (BIDs) to these issues for inclusion in the Security Focus vulnerability database.
CVE: These issues are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.
6/19/2013 Including Symantec Endpoint Protection Center (SPC) 12.0 Small Business Edition in affected products.