CVE-2002-0344
CVSS5.0
发布时间 :2002-06-25 00:00:00
修订时间 :2016-10-17 22:19:33
NMCOS    

[原文]Symantec LiveUpdate 1.5 and earlier in Norton Antivirus stores usernames and passwords for a local LiveUpdate server in cleartext in the registry, which may allow remote attackers to impersonate the LiveUpdate server.


[CNNVD]Symantec Norton Antivirus LiveUpdate功能明文存放认证信息漏洞(CNNVD-200206-065)

        
        Symantec Norton AntiVirus有一个称为LiveUpdate的功能,它通过internet的Symantec站点上获得信息检查病毒库的更新情况,下载并安装它。 这个过程可以计划运行也可以手工执行。
        AntiVirus实现上存在问题,本地攻击者可能轻易得到LiveUpdate的认证信息。
        LiveUpdate的认证信息以明文的形式存放在注册表中,一个本地攻击者可以很容易地获取这些信息。其他使用LiveUpdate功能的产品也受此问题的影响。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0344
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0344
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200206-065
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101466781122312&w=2
(UNKNOWN)  BUGTRAQ  20020225 Symantec LiveUpdate
http://marc.info/?l=bugtraq&m=101496301307285&w=2
(UNKNOWN)  BUGTRAQ  20020228 Re: "Javier Sanchez" jsanchez157@hotmail.com 02/25/2002 11:14 AM, Symantec
http://www.iss.net/security_center/static/8282.php
(VENDOR_ADVISORY)  XF  nav-liveupdate-plaintext-account(8282)
http://www.securityfocus.com/bid/4170
(VENDOR_ADVISORY)  BID  4170

- 漏洞信息

Symantec Norton Antivirus LiveUpdate功能明文存放认证信息漏洞
中危 设计错误
2002-06-25 00:00:00 2005-10-20 00:00:00
本地  
        
        Symantec Norton AntiVirus有一个称为LiveUpdate的功能,它通过internet的Symantec站点上获得信息检查病毒库的更新情况,下载并安装它。 这个过程可以计划运行也可以手工执行。
        AntiVirus实现上存在问题,本地攻击者可能轻易得到LiveUpdate的认证信息。
        LiveUpdate的认证信息以明文的形式存放在注册表中,一个本地攻击者可以很容易地获取这些信息。其他使用LiveUpdate功能的产品也受此问题的影响。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,Javier Sanchez (jsanchez157@hotmail.com)建议您采取以下措施以降低威胁:
        * 生成一个包含以下内容的.reg文件,完成后双击此文件将其导入注册表:
        [HKEY_LOCAL_MACHINE\SOFTWARE\INTEL\LANDesk\VirusProtect6\CurrentVersion\LiveUpdateSource]
        "Login"=-
        "Password"=-
        厂商补丁:
        Symantec
        --------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.symantec.com/

- 漏洞信息

4710
Symantec LiveUpdate Password Exposure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Symantec LiveUpdate contains a flaw that may lead to an unauthorized password exposure. The problem is that LiveUpdate stores usernames and passwords for a local LiveUpdate server in plaintext in the registry, which may lead to a loss of confidentiality.

- 时间线

2002-02-25 Unknow
2002-02-25 Unknow

- 解决方案

Upgrade to version 1.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Symantec Norton Antivirus LiveUpdate Plaintext Credentials Vulnerability
Design Error 4170
No Yes
2002-02-25 12:00:00 2009-07-11 10:56:00
This issue was reported to BugTraq on February 25th, 2002 by "Javier Sanchez" <jsanchez157@hotmail.com>.

- 受影响的程序版本

Symantec LiveUpdate 1.7
+ Symantec Norton AntiVirus 2001 0
+ Symantec Norton AntiVirus 2002 0
+ Symantec Norton AntiVirus Corporate Edition 7.6
Symantec LiveUpdate 1.6
+ Symantec Norton AntiVirus 2001 0
+ Symantec Norton AntiVirus 2002 0
+ Symantec Norton AntiVirus Corporate Edition 7.51
+ Symantec Norton AntiVirus Corporate Edition 7.5
Symantec LiveUpdate 1.5
+ Symantec Norton AntiVirus 2001 0
Symantec LiveUpdate 1.4
+ Symantec Norton AntiVirus 5.0

- 漏洞讨论

Symantec Norton AntiVirus contains a feature called LiveUpdate. LiveUpdate is a process that checks for new virus definitions over the internet, downloads and installs them from a Symantec site. This process can either be scheduled or performed manually.

Authentication credentials for the LiveUpdate service are stored in plaintext in the Windows registry. It is possible for a local attacker or malicious users on client machines to gain access to this information.

This issue has been reported for LiveUpdate running with Symantec Norton AntiVirus Corporate Edition. It is possible that other products which use the LiveUpdate service may also be affected by this vulnerability.

Symantec has reported that LiveUpdate 1.5 and 1.6 encrypt the username and
password by default. It is believed that this is not a LiveUpdate issue, it is an internal server issue when passing the username and password to the client system.

- 漏洞利用

The attacker may use regedit to search for the authentication credentials.

- 解决方案

Symantec has acknowledged this issue and an update will be made available. The release date of this fix is not yet known.

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站