TITLE: Symantec Scan Engine Multiple Vulnerabilities SECUNIA ADVISORY ID: SA19734 VERIFY ADVISORY: http://secunia.com/advisories/19734/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of sensitive information WHERE: >From local network SOFTWARE: Symantec Scan Engine 5.x http://secunia.com/product/6651/ DESCRIPTION: Three vulnerabilities has been reported in Symantec Scan Engine, which can be exploited by malicious people to disclose potentially sensitive information, bypass authentication and conduct man-in-the-middle (MITM) attacks. 1) A design error in the authentication mechanism used by Symantec Scan Engine can be exploited to gain access to the web-based administrative interface via specially-crafted XML requests sent to the server using its proprietary protocol. 2) Symantec Scan Engine uses a static private DSA key for SSL communications between the server and the administrative control application. This key cannot be changed and can potentially be exploited in a man-in-the-middle attack to decrypt all communications between the Scan Engine and an administrative client. 3) Symantec Scan Engine does not properly restrict access to files within the installation directory. This can be exploited by unauthenticated users to download any file located under the directory, such as the configuration file, the scanning logs, and the current virus definitions via HTTP requests. The vulnerabilities have been reported in version 5.0. SOLUTION: Update to version 5.1. PROVIDED AND/OR DISCOVERED BY: 1,2) Marc Bevand of Rapid7 3) Joe Testa of Rapid7 ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.04.21.html Rapid7: http://www.rapid7.com/advisories/R7-0021.html http://www.rapid7.com/advisories/R7-0022.html http://www.rapid7.com/advisories/R7-0023.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------