Summary
Detail | |||
---|---|---|---|
Vendor | Symantec | First view | 2009-04-29 |
Product | Endpoint Protection | Last view | 2020-05-11 |
Version | * | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:symantec:endpoint_protection |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2020-05-11 | CVE-2020-5837 | Symantec Endpoint Protection, prior to 14.3, may not respect file permissions when writing to log files that are replaced by symbolic links, which can lead to a potential elevation of privilege. |
7.8 | 2020-05-11 | CVE-2020-5836 | Symantec Endpoint Protection, prior to 14.3, can potentially reset the ACLs on a file as a limited user while Symantec Endpoint Protection's Tamper Protection feature is disabled. |
7.8 | 2020-01-09 | CVE-2016-5311 | A Privilege Escalation vulnerability exists in Symantec Norton Antivirus, Norton AntiVirus with Backup, Norton Security, Norton Security with Backup, Norton Internet Security, Norton 360, Endpoint Protection Small Business Edition Cloud, and Endpoint Protection Cloud Client due to a DLL-preloading without path restrictions, which could let a local malicious user obtain system privileges. |
7.8 | 2019-11-15 | CVE-2019-18372 | Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
6.7 | 2019-11-15 | CVE-2019-12758 | Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature. |
7.8 | 2018-11-29 | CVE-2018-12245 | Symantec Endpoint Protection prior to 14.2 MP1 may be susceptible to a DLL Preloading vulnerability, which in this case is an issue that can occur when an application being installed unintentionally loads a DLL provided by a potential attacker. Note that this particular type of exploit only manifests at install time; no remediation is required for software that has already been installed. This issue only impacted the Trialware media for Symantec Endpoint Protection, which has since been updated. |
6.8 | 2018-11-29 | CVE-2018-12239 | Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected. |
7.8 | 2018-11-29 | CVE-2018-12238 | Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected. |
8.8 | 2018-06-20 | CVE-2018-5237 | Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. |
5.3 | 2018-06-20 | CVE-2018-5236 | Symantec Endpoint Protection prior to 14 RU1 MP1 or 12.1 RU6 MP10 may be susceptible to a race condition (or race hazard). This type of issue occurs in software where the output is dependent on the sequence or timing of other uncontrollable events. |
7.8 | 2018-04-16 | CVE-2016-9094 | Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client. |
7 | 2018-04-16 | CVE-2016-9093 | A version of the SymEvent Driver that shipped with Symantec Endpoint Protection 12.1 RU6 MP6 and earlier fails to properly sanitize logged-in user input. SEP 14.0 and later are not impacted by this issue. A non-admin user would need to be able to save an executable file to disk and then be able to successfully run that file. If properly constructed, the file could access the driver interface and potentially manipulate certain system calls. On all 32-bit systems and in most cases on 64-bit systems, this will result in a denial of service that will crash the system. In very narrow circumstances, and on 64-bit systems only, this could allow the user to run arbitrary code on the local machine with kernel-level privileges. This could result in a non-privileged user gaining privileged access on the local machine. |
7.1 | 2017-11-06 | CVE-2017-6331 | Prior to SEP 14 RU1 Symantec Endpoint Protection product can encounter an issue of Tamper-Protection Bypass, which is a type of attack that bypasses the real time protection for the application that is run on servers and clients. |
7.8 | 2017-11-06 | CVE-2017-13681 | Symantec Endpoint Protection prior to SEP 12.1 RU6 MP9 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. In the circumstances of this issue, the capability of exploit is limited by the need to perform multiple file and directory writes to the local filesystem and as such, is not feasible in a standard drive-by type attack. |
5.5 | 2017-11-06 | CVE-2017-13680 | Prior to SEP 12.1 RU6 MP9 & SEP 14 RU1 Symantec Endpoint Protection Windows endpoint can encounter a situation whereby an attacker could use the product's UI to perform unauthorized file deletes on the resident file system. |
5.5 | 2017-04-14 | CVE-2016-5310 | The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression. |
5.5 | 2017-04-14 | CVE-2016-5309 | The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression. |
7.2 | 2015-11-11 | CVE-2015-8113 | Untrusted search path vulnerability in the client in Symantec Endpoint Protection (SEP) 12.1 before 12.1-RU6-MP3 allows local users to gain privileges via a Trojan horse DLL in a client install package. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1492. |
6.5 | 2015-09-20 | CVE-2014-9229 | Multiple SQL injection vulnerabilities in interface PHP scripts in the Manager component in Symantec Endpoint Protection (SEP) before 12.1.6 allow remote authenticated users to execute arbitrary SQL commands by leveraging the Limited Administrator role. |
4.9 | 2015-09-20 | CVE-2014-9228 | sysplant.sys in the Manager component in Symantec Endpoint Protection (SEP) before 12.1.6 allows local users to cause a denial of service (blocked system shutdown) by triggering an unspecified deadlock condition. |
4.4 | 2015-09-20 | CVE-2014-9227 | Multiple untrusted search path vulnerabilities in the Manager component in Symantec Endpoint Protection (SEP) before 12.1.6 allow local users to gain privileges via a Trojan horse DLL in an unspecified directory. |
7.2 | 2014-01-10 | CVE-2013-5011 | Unquoted Windows search path vulnerability in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 allows local users to gain privileges via a crafted program in the %SYSTEMDRIVE% directory. |
4.6 | 2014-01-10 | CVE-2013-5010 | The Application/Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly handle custom polices, which allows local users to bypass intended policy restrictions and access files or directories via unspecified vectors. |
7.4 | 2014-01-10 | CVE-2013-5009 | The Management Console in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly perform authentication, which allows remote authenticated users to gain privileges by leveraging access to a limited-admin account. |
9.3 | 2009-04-29 | CVE-2009-1431 | XFR.EXE in the Intel File Transfer service in the console in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary code by placing the code on a (1) share or (2) WebDAV server, and then sending the UNC share pathname to this service. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
12% (2) | CWE-427 | Uncontrolled Search Path Element |
12% (2) | CWE-20 | Improper Input Validation |
6% (1) | CWE-787 | Out-of-bounds Write |
6% (1) | CWE-426 | Untrusted Search Path |
6% (1) | CWE-399 | Resource Management Errors |
6% (1) | CWE-362 | Race Condition |
6% (1) | CWE-287 | Improper Authentication |
6% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
6% (1) | CWE-125 | Out-of-bounds Read |
6% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
6% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
6% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
6% (1) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
6% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
SAINT Exploits
Description | Link |
---|---|
Symantec Alert Management System Intel Alert Originator Service msgsys.exe buffer overflow | More info here |
Symantec Alert Management System Intel File Transfer service command execution | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
54160 | Symantec Multiple Products Alert Management System Console Intel File Transfe... |
54159 | Symantec Multiple Products Intel Alert Originator Service (IAO.EXE) MsgSys.ex... |
54158 | Symantec Multiple Products Intel Alert Originator Service (IAO.EXE) memcpy() ... |
54157 | Symantec Multiple Products Intel Common Base Agent (CBA) CreateProcessA() Fun... |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2009-A-0037 | Multiple Vulnerabilities in Symantec Products Severity: Category I - VMSKEY: V0019153 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-10-27 | Symantec Endpoint Protection tamper protection bypass attempt RuleID : 55814 - Type : SERVER-OTHER - Revision : 1 |
2020-10-27 | Symantec Endpoint Protection tamper protection bypass attempt RuleID : 55813 - Type : SERVER-OTHER - Revision : 1 |
2015-05-05 | Symantec System Center Alert Management System untrusted command execution at... RuleID : 33987 - Type : SERVER-OTHER - Revision : 3 |
2014-01-10 | Symantec Multiple Products Intel Common Base Agent CreateProcessA Function re... RuleID : 17048 - Type : EXPLOIT - Revision : 4 |
2014-01-10 | Symantec System Center Alert Management System untrusted command execution at... RuleID : 16332 - Type : SERVER-OTHER - Revision : 13 |
2014-01-10 | Symantec Alert Management System Intel File Transfer Service arbitrary progra... RuleID : 15556 - Type : EXPLOIT - Revision : 3 |
2014-01-10 | Symantec Alert Management System Intel Alert Originator Service buffer overfl... RuleID : 15555 - Type : SERVER-OTHER - Revision : 7 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-11-08 | Name: The Symantec Endpoint Protection Client installed on the remote host is affec... File: symantec_endpoint_prot_client_sym17-011.nasl - Type: ACT_GATHER_INFO |
2017-06-02 | Name: The Symantec Endpoint Protection Client installed on the remote host is affec... File: symantec_endpoint_prot_client_sym17-002_cve-2016-9094.nasl - Type: ACT_GATHER_INFO |
2017-03-10 | Name: The Symantec Endpoint Protection Client installed on the remote host is affec... File: symantec_endpoint_prot_client_sym17-002.nasl - Type: ACT_GATHER_INFO |
2016-12-21 | Name: A security application installed on the remote host is affected by an elevati... File: symantec_endpoint_prot_client_sym16-021.nasl - Type: ACT_GATHER_INFO |
2016-09-26 | Name: A security application installed on the remote host is affected by multiple d... File: symantec_endpoint_prot_client_sym16-015.nasl - Type: ACT_GATHER_INFO |
2016-09-22 | Name: A messaging security application running on the remote host is affected by mu... File: symantec_messaging_gateway_sym16-015.nasl - Type: ACT_GATHER_INFO |
2016-09-22 | Name: A security application installed on the remote host is affected by multiple d... File: symantec_protection_engine_sym16_015.nasl - Type: ACT_GATHER_INFO |
2016-09-22 | Name: A security application installed on the remote host is affected by multiple v... File: symantec_protection_engine_sym16_015_nix.nasl - Type: ACT_GATHER_INFO |
2016-09-22 | Name: A security application installed on the remote host is affected by multiple d... File: symantec_protection_sharepoint_servers_sym16_015.nasl - Type: ACT_GATHER_INFO |
2016-09-22 | Name: A security application installed on the remote host is affected by multiple d... File: symantec_sms_sym_16-015.nasl - Type: ACT_GATHER_INFO |
2015-11-13 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym15-011.nasl - Type: ACT_GATHER_INFO |
2015-06-24 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym15-005.nasl - Type: ACT_GATHER_INFO |
2014-01-16 | Name: The version of Symantec Endpoint Protection Client installed on the remote ho... File: symantec_endpoint_prot_client_sym14-001.nasl - Type: ACT_GATHER_INFO |
2014-01-16 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym14-001.nasl - Type: ACT_GATHER_INFO |
2010-03-02 | Name: The remote Windows host has a service that is affected by a remote code execu... File: symantec_ams2_multiple_overflows.nasl - Type: ACT_GATHER_INFO |
2009-05-03 | Name: The remote service seems to allow execution of arbitrary commands. File: landesk_cba_createprocessa_cmd_exec.nasl - Type: ACT_GATHER_INFO |