My next class:

Exploit Available for Symantec End Point Protection

Published: 2014-08-06. Last Updated: 2014-08-08 14:30:12 UTC
by Johannes Ullrich (Version: 1)
5 comment(s)

An exploit is now available at exploit-db.com for the Symantec End Point Protection privilege escalation vulnerability. Symantec released a patch for this issue earlier this week [1].

The vulnerability requires normal-user access to the affected system and can be used to escalate privileges to fully control the system (instead of being limited to a particular user) so this will make a great follow up exploit to a standard drive-by exploit that gains user privileges.

We have gotten some reports that users have problems installing the patch on legacy systems (e.g. Windows 2003). Applying the patch just fails in these cases and appears to have no ill effect on system stability.

[1] http://www.symantec.com/business/support/index?page=content&id=TECH223338

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

Keywords: symantec
5 comment(s)
My next class:

Comments

I believe you mean, "An exploit is now available..."
Could you please share the link to exploitDB? Not sure if Symantec is aware of it.
Hi,

This is not an issue with Symantec installer. This is happening because of outdated Verisign root and code signing certificates on Windows XP and Windows server 2003. You can follow below KB to get it resolved. It is tested OK.

http://www.symantec.com/business/support/index?page=content&id=TECH218029
Install failure on Windows 2003 is not an issue with the update at all. You need to check your root certificates. We have updated a couple of servers successfully.
Refer to this knowledge base article and all will be well.
http://www.symantec.com/business/support/index?page=content&id=TECH218029
I've seen it in a few places but here is one:

http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html

Diary Archives