CVE-2006-3455
CVSS4.3
发布时间 :2006-10-23 16:07:00
修订时间 :2011-03-07 21:38:40
NMCOS    

[原文]The SAVRT.SYS device driver, as used in Symantec AntiVirus Corporate Edition 8.1 and 9.0.x up to 9.0.3, and Symantec Client Security 1.1 and 2.0.x up to 2.0.3, allows local users to execute arbitrary code via a modified address for the output buffer argument to the DeviceIOControl function.


[CNNVD]Symantec AntiVirus 'SAVRT.SYS'驱动本地权限提升漏洞(CNNVD-200610-380)

        Symantec AntiVirus是非常流行的杀毒解决方案。
        Symantec AntiVirus的SAVRT.SYS驱动在处理输入缓冲区时存在漏洞,本地攻击者可能利用此漏洞提升权限或导致拒绝服务。
        由于没有正确的验证输出缓冲区的地址空间,Symantec的SAVRT.SYS中的安全漏洞可能允许恶意用户使用DeviceIOControl()的输出缓冲区覆盖内核地址。成功利用这个漏洞可能允许本地攻击者以提升的权限执行任意指令或导致系统崩溃。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:symantec:norton_antivirus:8.01.471::corporate
cpe:/a:symantec:client_security:2.0_scf_7.1
cpe:/a:symantec:client_security:2.0
cpe:/a:symantec:client_security:1.1.1_mr3_build_8.1.1.323
cpe:/a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2Symantec Client Security 2.0.2 MR2_b9.0.2.1000
cpe:/a:symantec:norton_antivirus:9.0.1.1000::corporate
cpe:/a:symantec:norton_antivirus:9.0.2.1000::corporate
cpe:/a:symantec:client_security:2.0_stm_build_9.0.0.338
cpe:/a:symantec:client_security:1.1.1_mr6_b8.1.1.266
cpe:/a:symantec:client_security:1.1.1_mr4_build_8.1.1.329
cpe:/a:symantec:norton_antivirus:8.01.434::corporate
cpe:/a:symantec:norton_antivirus:9.0.2::corporate
cpe:/a:symantec:norton_antivirus:8.1.1.329::corporate
cpe:/a:symantec:client_security:1.1
cpe:/a:symantec:norton_antivirus:8.1.1_build8.1.1.314a::corporate
cpe:/a:symantec:client_security:1.1.1_build_393
cpe:/a:symantec:norton_antivirus:9.0.1.1.1000::corporate
cpe:/a:symantec:norton_antivirus:8.1.1_build393::corporate
cpe:/a:symantec:norton_antivirus:8.01.446::corporate
cpe:/a:symantec:norton_antivirus:8.1.1.323::corporate
cpe:/a:symantec:client_security:2.0.2Symantec Client Security 2.0.2
cpe:/a:symantec:norton_antivirus:8.01.437::corporate
cpe:/a:symantec:norton_antivirus:8.1.0.825a::corporate
cpe:/a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3Symantec Client Security 2.0.3 MR3_b9.0.3.1000
cpe:/a:symantec:norton_antivirus:8.1::corporate
cpe:/a:symantec:client_security:1.1.1_mr2_build_8.1.1.319
cpe:/a:symantec:norton_antivirus:8.01.457::corporate
cpe:/a:symantec:norton_antivirus:8.1.1.319::corporate
cpe:/a:symantec:client_security:2.0.3Symantec Client Security 2.0.3
cpe:/a:symantec:norton_antivirus:8.1.1::corporate
cpe:/a:symantec:client_security:1.1.1_mr5_build_8.1.1.336
cpe:/a:symantec:norton_antivirus:9.0.1::corporate
cpe:/a:symantec:norton_antivirus:8.01.464::corporate
cpe:/a:symantec:norton_antivirus:8.1.1.377::corporate
cpe:/a:symantec:client_security:2.0.1Symantec Client Security 2.0.1
cpe:/a:symantec:client_security:1.1.1Symantec Symantec Client Security 1.1.1
cpe:/a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a
cpe:/a:symantec:norton_antivirus:8.1.1.366::corporate
cpe:/a:symantec:client_security:1.1_stm_b8.1.0.825a
cpe:/a:symantec:norton_antivirus:8.01.460::corporate
cpe:/a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1Symantec Client Security 2.0.1 MR1_b9.0.1.1000

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3455
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3455
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200610-380
(官方数据源) CNNVD

- 其它链接及资源

http://www.symantec.com/avcenter/security/Content/2006.10.23.html
(PATCH)  CONFIRM  http://www.symantec.com/avcenter/security/Content/2006.10.23.html
http://www.vupen.com/english/advisories/2006/4157
(UNKNOWN)  VUPEN  ADV-2006-4157
http://xforce.iss.net/xforce/xfdb/29762
(UNKNOWN)  XF  symantec-savrt-privilege-escalation(29762)
http://www.securityfocus.com/bid/20684
(UNKNOWN)  BID  20684
http://www.securityfocus.com/archive/1/archive/1/449524/100/0/threaded
(UNKNOWN)  BUGTRAQ  20061023 Symantec Product Security: Symantec Device Driver Elevation of Privileg
http://securitytracker.com/id?1017109
(UNKNOWN)  SECTRACK  1017109
http://securitytracker.com/id?1017108
(UNKNOWN)  SECTRACK  1017108
http://secunia.com/advisories/22536
(UNKNOWN)  SECUNIA  22536

- 漏洞信息

Symantec AntiVirus 'SAVRT.SYS'驱动本地权限提升漏洞
中危 边界条件错误
2006-10-23 00:00:00 2006-10-24 00:00:00
本地  
        Symantec AntiVirus是非常流行的杀毒解决方案。
        Symantec AntiVirus的SAVRT.SYS驱动在处理输入缓冲区时存在漏洞,本地攻击者可能利用此漏洞提升权限或导致拒绝服务。
        由于没有正确的验证输出缓冲区的地址空间,Symantec的SAVRT.SYS中的安全漏洞可能允许恶意用户使用DeviceIOControl()的输出缓冲区覆盖内核地址。成功利用这个漏洞可能允许本地攻击者以提升的权限执行任意指令或导致系统崩溃。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www.symantec.com/

- 漏洞信息

29986
Symantec Products SAVRT.SYS DeviceIOControl Function Local Privilege Escalation

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-10-23 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Symantec AntiVirus SAVRT.SYS Local Privilege Escalation Vulnerability
Boundary Condition Error 20684
No Yes
2006-10-23 12:00:00 2006-10-24 07:28:00
Boon Seng Lim is credited with the discovery of this vulnerability.

- 受影响的程序版本

Symantec Client Security 2.0.4
Symantec Client Security 2.0.3 MR3 b9.0.3.1000
Symantec Client Security 2.0.2 MR2 b9.0.2.1000
Symantec Client Security 2.0.1 MR1 b9.0.1.1000
Symantec Client Security 2.0 STM build 9.0.0.338
Symantec Client Security 2.0 (SCF 7.1)
Symantec Client Security 2.0 (SCF 7.1)
Symantec Client Security 2.0
Symantec Client Security 1.1.1
Symantec Client Security 1.1 STM b8.1.0.825a
Symantec Client Security 1.1
Symantec Client Security 1.0.1 MR8 build 8.01.471
Symantec Client Security 1.0.1 MR7 build 8.01.464
Symantec Client Security 1.0.1 MR6 build 8.01.460
Symantec Client Security 1.0.1 MR5 build 8.01.457
Symantec Client Security 1.0.1 MR4 build 8.01.446
Symantec Client Security 1.0.1 MR3 build 8.01.434
Symantec Client Security 1.0.1 build 8.01.437
Symantec Client Security 1.0.1 MR9 b8.01.501
Symantec Client Security 1.0.1 MR2 b8.01.429c
Symantec Client Security 1.0.1 MR1 b8.01.425a/b
Symantec Client Security 1.0.1
Symantec Client Security 1.0 .0 b8.01.9378
Symantec Client Security 1.0 b8.01.9374
Symantec Client Security 1.0
Symantec AntiVirus Corporate Edition 9.0.3 .1000
Symantec AntiVirus Corporate Edition 9.0.2 .1000
Symantec AntiVirus Corporate Edition 9.0.1 .1.1000
Symantec AntiVirus Corporate Edition 9.0 .0.338
Symantec AntiVirus Corporate Edition 9.0
Symantec AntiVirus Corporate Edition 8.1.1 build 8.1.1.329
Symantec AntiVirus Corporate Edition 8.1.1 build 8.1.1.323
Symantec AntiVirus Corporate Edition 8.1.1 build 8.1.1.319
Symantec AntiVirus Corporate Edition 8.1.1 build 8.1.1.314a
Symantec AntiVirus Corporate Edition 8.1.1 build 393
Symantec AntiVirus Corporate Edition 8.1.1 .377
Symantec AntiVirus Corporate Edition 8.1.1 .366
Symantec AntiVirus Corporate Edition 8.1.1
Symantec AntiVirus Corporate Edition 8.1 build 8.01.471
Symantec AntiVirus Corporate Edition 8.1 build 8.01.464
Symantec AntiVirus Corporate Edition 8.1 build 8.01.460
Symantec AntiVirus Corporate Edition 8.1 build 8.01.457
Symantec AntiVirus Corporate Edition 8.1 build 8.01.446
Symantec AntiVirus Corporate Edition 8.1 build 8.01.437
Symantec AntiVirus Corporate Edition 8.1 build 8.01.434
Symantec AntiVirus Corporate Edition 8.1 .0.825a
Symantec AntiVirus Corporate Edition 8.1
Symantec Client Security 2.0.4 MR4 build 1000
Symantec Client Security 1.1.1 MR9 Build 393
Symantec AntiVirus Corporate Edition 9.0.4 MR4 build 1000
Symantec AntiVirus Corporate Edition 8.1.1 MR9

- 不受影响的程序版本

Symantec Client Security 2.0.4 MR4 build 1000
Symantec Client Security 1.1.1 MR9 Build 393
Symantec AntiVirus Corporate Edition 9.0.4 MR4 build 1000
Symantec AntiVirus Corporate Edition 8.1.1 MR9

- 漏洞讨论

Symantec AntiVirus and Symantec Client Security are prone to a privilege-escalation vulnerability.

Local attackers can exploit this issue to corrupt memory and execute arbitrary code with kernel-level privileges. Successful exploits may facilitate a complete system compromise.

This issue affects:

- Symantec AntiVirus Corporate Edition
- Symantec Client Security.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Symantec has released security advisory SYM06-022 to address this issue. Please see the referenced advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站