Vigil@nce - Symantec Endpoint Protection: seven vulnerabilities
September 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Symantec Endpoint
Protection.
Impacted products: Symantec Endpoint Protection.
Severity: 2/4.
Creation date: 31/07/2015.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Symantec Endpoint
Protection.
An attacker can bypass security features in Password Reset, in
order to escalate his privileges. [severity:2/4; CVE-2015-1486]
An attacker can use the Console Session, in order to create a
file. [severity:2/4; CVE-2015-1487]
An attacker can use an Action Handler, in order to read a file.
[severity:1/4; CVE-2015-1488]
An attacker can bypass security features in a SEPM Service, in
order to escalate his privileges. [severity:2/4; CVE-2015-1489]
An attacker can traverse directories during a client installation,
in order to read a file outside the root path. [severity:2/4;
CVE-2015-1490]
An attacker can use a SQL injection, in order to read or alter
data. [severity:2/4; CVE-2015-1491]
An attacker can use a DLL preload, in order to run code.
[severity:2/4; CVE-2015-1492]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Symantec-Endpoint-Protection-seven-vulnerabilities-17553