---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Symantec Products SYMTDI.SYS IOCTL Handler Privilege Escalation SECUNIA ADVISORY ID: SA26042 VERIFY ADVISORY: http://secunia.com/advisories/26042/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: Symantec Norton AntiSpam 2005 http://secunia.com/product/14763/ Symantec Norton AntiVirus 2005 http://secunia.com/product/4009/ Symantec Norton AntiVirus 2006 http://secunia.com/product/6634/ Symantec Norton Internet Security 2005 http://secunia.com/product/4848/ Symantec Norton Internet Security 2006 http://secunia.com/product/6635/ Symantec Norton Personal Firewall 2005 http://secunia.com/product/6637/ Symantec Norton Personal Firewall 2006 http://secunia.com/product/6638/ Symantec Norton SystemWorks 2005 http://secunia.com/product/4847/ Symantec Norton SystemWorks 2006 http://secunia.com/product/6636/ Symantec AntiVirus Corporate Edition 9.x http://secunia.com/product/3549/ Symantec AntiVirus Corporate Edition 10.x http://secunia.com/product/5555/ Symantec Client Security 2.x http://secunia.com/product/3478/ Symantec Client Security 3.x http://secunia.com/product/6649/ DESCRIPTION: A vulnerability has been reported in various Symantec products, which can be exploited by malicious, local users to gain escalated privileges. Insufficient address space verification within the 0x83022323 IOCTL handler in SYMTDI.SYS can be exploited to overwrite arbitrary memory and execute code with kernel privileges via specially crafted IRP parameters passed to the affected IOCTL handler. The vulnerability is reported in SYMTDI.SYS versions prior to 7.0.0 and affects the following products: * Norton AntiSpam 2005 * Norton AntiVirus 2005/2006 * Norton Internet Security 2005/2006 * Norton Personal Firewall 2005/2006 * Norton System Works 2005/2006 * Symantec AntiVirus Corporate Edition 9.x * Symantec AntiVirus Corporate Edition 10.0/10.1 * Symantec Client Security 2.0/3.0/3.1 SOLUTION: Apply updates or run LiveUpdate. Please see the vendor's advisory for details. PROVIDED AND/OR DISCOVERED BY: Zohiartze Herce, reported via iDefense Labs. ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------