发布时间 :2005-04-12 00:00:00
修订时间 :2016-10-17 23:17:13

[原文]Sygate Security Agent (SSA) in Sygate Secure Enterprise 3.5 through 4.1 does not prevent the security policy from being updated by unprivileged users, which allows local users to modify the policy by exporting the policy file, changing it, and importing it back into SSA.

[CNNVD]Sygate Security Agent XML安全策略文件本地绕过漏洞(CNNVD-200504-023)

        Sygate Secure Enterprise 3.5至4.1版本的Sygate Security Agent (SSA)未防止未授权用户更新安全政策,本地用户可借此通过导出政策文件、修改并重新导入到SSA,从而完成对政策的修改。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050412 IRM 011: Sygate,Security Agent (Sygate Secure Enterprise) Fail Open

- 漏洞信息

Sygate Security Agent XML安全策略文件本地绕过漏洞
中危 访问验证错误
2005-04-12 00:00:00 2006-08-24 00:00:00
        Sygate Secure Enterprise 3.5至4.1版本的Sygate Security Agent (SSA)未防止未授权用户更新安全政策,本地用户可借此通过导出政策文件、修改并重新导入到SSA,从而完成对政策的修改。

- 公告与补丁


- 漏洞信息

Sygate Security Agent Unprivileged Local Policy Modification
Local Access Required Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-04-11 2005-01-24
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability
Access Validation Error 13140
No Yes
2005-04-12 12:00:00 2009-07-12 12:56:00
Discovery of this issue is credited to Mazin Faour.

- 受影响的程序版本

Sygate Security Agent 4.1
Sygate Security Agent 4.0
Sygate Security Agent 3.5 build 2577
Sygate Security Agent 3.5 build 2576

- 漏洞讨论

Sygate Security Agent (SSA) is prone to a security vulnerability. The application fails to control which users may Export and Import security policy files.

A local attacker may export and edit an SSA XML security policy file, and may then import the changed file into the affected software. This may allow the attacker to change security settings in SSA, i.e. trusted IP address, or DNS names, or crash the software.

A local attacker may exploit this issue to bypass the SSA security restrictions.

This issue only exists when the software is running in SSA running in 'Server Control' or 'Power User' Modes.

- 漏洞利用

No exploit is required.

- 解决方案

Reports indicate that the vendor has released SSA3.5 build 2580, SSA4.0 build 2715, and SSA4.1 build 2827 to address this issue. This is not confirmed. Customers are advised to contact the vendor for information regarding obtaining and applying appropriate fixes.

- 相关参考