This is the alert we use at the State of Iowa (Symantec has been very upfront and forthcoming with this) ->
Overview:
Multiple vulnerabilities have been identified within various Symantec security products which could allow a remote attacker to take complete control of an affected system without any user interaction. Symantec's suite of security products includes network devices and consumer software that are used by both enterprise and home level users.
It should be noted that exploit code is not publicly available for any of these vulnerabilities.
Affected Software:
• Symantec AntiVirus Corporate Edition 9.0 MR6 and earlier
• Symantec AntiVirus Corporate Edition 10.0
• Symantec AntiVirus Corporate Edition 10.1 MR7 and earlier
• Symantec AntiVirus Corporate Edition 10.2 MR1 and earlier
• Symantec Client Security 2.0 MR6 and earlier
• Symantec Client Security 3.0
• Symantec Client Security 3.1 MR7 and earlier
• Symantec Endpoint Protection 11.0 MR2 and earlier
• Norton 360 1.0
• Norton Internet Security 2005 through 2008
• Symantec Antivirus 10.1 MR7 and earlier
Description:
Four of the five vulnerabilities discovered in various Symantec security products could allow for remote code execution.
Four of these vulnerabilities affect Symantec Alert Management System 2 (AMS2). AMS2 is an optional component for a number of Symantec security products. This component listens for specific security related events on a computer network and sends notifications as specified by the administrator.
• The Intel LANDesk Common Base Agent (CBA) component of AMS2 is prone to a vulnerability that attackers can leverage to execute arbitrary commands. This issue occurs because the software fails to sufficiently sanitize user-supplied data submitted as a TCP packet on port 12174 before passing it as a parameter to a 'CreateProcessA()' function call.
• The Intel File Transfer service (XFR.EXE) component of the AMS2 Console is prone to a vulnerability that attackers can leverage to execute arbitrary code. An attacker able to establish a TCP connection to the affected process can exploit this issue to execute arbitrary code hosted on remote fileshares or WebDav (Web-based Distributed Authoring and Versioning) servers.
• The Intel Alert Originator Service component of AMS2 is prone to a stack-based buffer-overflow vulnerability. This issue affects the 'IAO.exe' process and is triggered when processing a malformed packet. By default, the vulnerable service listens on TCP port 38292.
• The Intel Alert Originator Service component of AMS2 is prone to multiple stack-based buffer-overflow vulnerabilities. Specifically, these issues occur because the 'IAO.exe' process fails to sufficiently validate data received from the 'MsgSys.exe' process. By default, the affected service listens on TCP port 38292.
Successfully exploiting any of these vulnerabilities in AMS2 may allow an attacker to gain SYSTEM privileges, which could allow the attacker to gain complete control over the affected system without any user interaction.
An additional vulnerability affects Symantec's Log Viewer application ('ccLgView.exe') which is prone to two parsing issues that attackers can trigger by sending a specially crafted email containing HTML and script code. These scripts could be executed via the 'View Logs - Email Filtering' option. An attacker could exploit the Symantec Log Viewer vulnerability by supplying HTML code that could run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials. Other attacks may also be possible.
Solution/Recommendations:
We recommend the following actions be taken:
• Apply appropriate patches provided by Symantec to vulnerable systems immediately after appropriate testing.
• Do not open email from unknown or un-trusted sources.
• Block un-trusted incoming traffic from the Internet at your network perimeter.
References:
Symantec:
•
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02
•
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_01
Security Focus:
•
http://www.securityfocus.com/bid/34669
•
http://www.securityfocus.com/bid/34671
•
http://www.securityfocus.com/bid/35672
•
http://www.securityfocus.com/bid/34674
•
http://www.securityfocus.com/bid/34675
CVE:
•
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1428
•
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1429
•
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1430
•
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1431