CVE-2001-1125
CVSS7.5
发布时间 :2001-10-05 00:00:00
修订时间 :2008-09-05 16:25:45
NMCOS    

[原文]Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site.


[CNNVD]Symantec Norton Antivirus LiveUpdate 主机确认漏洞(CNNVD-200110-023)

        CVE(CAN) ID: CAN-2001-1125
        
        
        
        Symantec's Norton Antivirus具有一个特色功能"LiveUpdate",主要实现在线连接
        
        Symantec站点,自动下载和升级病毒库,这个功能可以手工或定期执行。
        
        
        
        发现Norton Antivirus LiveUpdate的实现存在缺陷,当在用户主机上使用
        
        "LiveUpdate"功能时没有进行数字签名,公钥或证书密码技术,这可能导致远程主机
        
        发送非法"LiveUpdates"给其它用户。
        
        
        
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:symantec:liveupdate:1.5Symantec LiveUpdate 1.5
cpe:/a:symantec:liveupdate:1.4Symantec LiveUpdate 1.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1125
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1125
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200110-023
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/3403
(VENDOR_ADVISORY)  BID  3403
http://www.securityfocus.com/archive/1/218717
(VENDOR_ADVISORY)  BUGTRAQ  20011005 Symantec LiveUpdate attacks
http://xforce.iss.net/static/7235.php
(VENDOR_ADVISORY)  XF  liveupdate-host-verification(7235)
http://www.sarc.com/avcenter/security/Content/2001.10.05.html
(UNKNOWN)  CONFIRM  http://www.sarc.com/avcenter/security/Content/2001.10.05.html

- 漏洞信息

Symantec Norton Antivirus LiveUpdate 主机确认漏洞
高危 设计错误
2001-10-05 00:00:00 2005-10-20 00:00:00
远程  
        CVE(CAN) ID: CAN-2001-1125
        
        
        
        Symantec's Norton Antivirus具有一个特色功能"LiveUpdate",主要实现在线连接
        
        Symantec站点,自动下载和升级病毒库,这个功能可以手工或定期执行。
        
        
        
        发现Norton Antivirus LiveUpdate的实现存在缺陷,当在用户主机上使用
        
        "LiveUpdate"功能时没有进行数字签名,公钥或证书密码技术,这可能导致远程主机
        
        发送非法"LiveUpdates"给其它用户。
        
        
        
        

- 公告与补丁

        
        
        厂商补丁:
        
        
        
        Symantec LiveUpdate 1.6不存在此问题,您可以在厂商主页下载最新版本:
        
        
        http://www.symantec.com/

- 漏洞信息

4712
Symantec LiveUpdate DNS Spoofing Execute Arbitrary Code

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-10-05 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Symantec Norton Antivirus LiveUpdate Host Verification Vulnerability
Design Error 3403
Yes No
2001-10-05 12:00:00 2009-07-11 07:56:00
Discovered by FX <fx@phenoelit.de>, DasIch <dasich@phenoelit.de> and kim0 <kim0@phenoelit.de> and published in a Symantec Security Response on October 5, 2001.

- 受影响的程序版本

Symantec LiveUpdate 1.5
+ Symantec Norton AntiVirus 2001 0
Symantec LiveUpdate 1.4
+ Symantec Norton AntiVirus 5.0
Symantec LiveUpdate 1.6
+ Symantec Norton AntiVirus 2001 0
+ Symantec Norton AntiVirus 2002 0
+ Symantec Norton AntiVirus Corporate Edition 7.51
+ Symantec Norton AntiVirus Corporate Edition 7.5

- 不受影响的程序版本

Symantec LiveUpdate 1.6
+ Symantec Norton AntiVirus 2001 0
+ Symantec Norton AntiVirus 2002 0
+ Symantec Norton AntiVirus Corporate Edition 7.51
+ Symantec Norton AntiVirus Corporate Edition 7.5

- 漏洞讨论

Symantec's Norton Antivirus contains a feature called LiveUpdate. LiveUpdate is a process that checks for new virus definitions over the internet, downloads and installs them from a Symantec site. This process can either be scheduled or performed manually.

A flaw exists in Symantec's implementation of Norton Antivirus LiveUpdate, which fails to use Cryptography (Digital Signatures, Public Keys or Certificates) when performing LiveUpdates on a user's system. Therefore, it is possible for a remote host to send illicit LiveUpdates to an unknowing user.

- 漏洞利用

Phenoelit Group has a detailed example of exploitation in their advisory. The advisory can be found in the Credit section.

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Symantec has acknowledged this issue and encourages users to upgrade to LiveUpdate 1.6. This updated version contains "cryptographic signatures" of all update files.

http://www.symantec.com/techsupp/files/lu/lu.html

Symantec's official response to this issue can be found at the following URL:

http://www.sarc.com/avcenter/security/Content/2001.10.05.html

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站