Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Symantec Endpoint Protection: seven vulnerabilities

September 2015 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can use several vulnerabilities of Symantec Endpoint
Protection.

Impacted products: Symantec Endpoint Protection.

Severity: 2/4.

Creation date: 31/07/2015.

DESCRIPTION OF THE VULNERABILITY

Several vulnerabilities were announced in Symantec Endpoint
Protection.

An attacker can bypass security features in Password Reset, in
order to escalate his privileges. [severity:2/4; CVE-2015-1486]

An attacker can use the Console Session, in order to create a
file. [severity:2/4; CVE-2015-1487]

An attacker can use an Action Handler, in order to read a file.
[severity:1/4; CVE-2015-1488]

An attacker can bypass security features in a SEPM Service, in
order to escalate his privileges. [severity:2/4; CVE-2015-1489]

An attacker can traverse directories during a client installation,
in order to read a file outside the root path. [severity:2/4;
CVE-2015-1490]

An attacker can use a SQL injection, in order to read or alter
data. [severity:2/4; CVE-2015-1491]

An attacker can use a DLL preload, in order to run code.
[severity:2/4; CVE-2015-1492]

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Symantec-Endpoint-Protection-seven-vulnerabilities-17553


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts