var-200604-0363
Vulnerability from variot
Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program. Symantec LiveUpdate for Macintosh is prone to a local privilege-escalation vulnerability. This issue is due to the application's failure to properly use the PATH environment variable in some of its components. A successful exploit allows local attackers to gain superuser privileges, leading to a complete compromise of the affected computer.
TITLE: Symantec LiveUpdate for Machintosh Privilege Escalation
SECUNIA ADVISORY ID: SA19682
VERIFY ADVISORY: http://secunia.com/advisories/19682/
CRITICAL: Less critical
IMPACT: Privilege escalation
WHERE: Local system
SOFTWARE: Symantec Norton Utilities for Macintosh 8.x http://secunia.com/product/5953/ Symantec Norton SystemWorks for Macintosh 3.x http://secunia.com/product/5952/ Symantec Norton Personal Firewall for Macintosh 3.x http://secunia.com/product/5950/ Symantec Norton Internet Security for Macintosh 3.x http://secunia.com/product/5951/ Symantec Norton AntiVirus for Macintosh 9.x http://secunia.com/product/5948/ Symantec Norton AntiVirus for Macintosh 10.x http://secunia.com/product/5949/ Symantec LiveUpdate for Macintosh 3.x http://secunia.com/product/5954/
DESCRIPTION: A vulnerability has been reported in Symantec LiveUpdate for Machintosh, which can be exploited by malicious, local users to gain escalated privileges.
SOLUTION: Apply latest LiveUpdate patch.
PROVIDED AND/OR DISCOVERED BY: The vendor credits DigitalMunition.com.
ORIGINAL ADVISORY: http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200604-0363", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.3" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.0" }, { "model": "norton utilities", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.0" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.0" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.9.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.2" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.0" }, { "model": "liveupdate", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.5" }, { "model": "liveupdate", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0" }, { "model": "liveupdate", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.3" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1" }, { "model": "liveupdate", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.2" }, { "model": "liveupdate", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.1" }, { "model": "norton utilities for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "norton system works for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "norton personal firewall for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "norton personal firewall for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "norton internet security for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.9.1" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.0" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1" }, { "model": "norton antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0" }, { "model": "liveupdate for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.5" }, { "model": "liveupdate for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.3" }, { "model": "liveupdate for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2" }, { "model": "liveupdate for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.1" }, { "model": "liveupdate for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "antivirus for macintosh", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" } ], "sources": [ { "db": "BID", "id": "17571" }, { "db": "CNNVD", "id": "CNNVD-200604-296" }, { "db": "NVD", "id": "CVE-2006-1836" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DigitalMunition.com is credited with the discovery of this issue.", "sources": [ { "db": "BID", "id": "17571" }, { "db": "CNNVD", "id": "CNNVD-200604-296" } ], "trust": 0.9 }, "cve": "CVE-2006-1836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "CVE-2006-1836", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.1, "id": "VHN-17944", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-1836", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200604-296", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-17944", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-17944" }, { "db": "CNNVD", "id": "CNNVD-200604-296" }, { "db": "NVD", "id": "CVE-2006-1836" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program. Symantec LiveUpdate for Macintosh is prone to a local privilege-escalation vulnerability. This issue is due to the application\u0027s failure to properly use the PATH environment variable in some of its components. \nA successful exploit allows local attackers to gain superuser privileges, leading to a complete compromise of the affected computer. \n\nTITLE:\nSymantec LiveUpdate for Machintosh Privilege Escalation\n\nSECUNIA ADVISORY ID:\nSA19682\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19682/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nPrivilege escalation\n\nWHERE:\nLocal system\n\nSOFTWARE:\nSymantec Norton Utilities for Macintosh 8.x\nhttp://secunia.com/product/5953/\nSymantec Norton SystemWorks for Macintosh 3.x\nhttp://secunia.com/product/5952/\nSymantec Norton Personal Firewall for Macintosh 3.x\nhttp://secunia.com/product/5950/\nSymantec Norton Internet Security for Macintosh 3.x\nhttp://secunia.com/product/5951/\nSymantec Norton AntiVirus for Macintosh 9.x\nhttp://secunia.com/product/5948/\nSymantec Norton AntiVirus for Macintosh 10.x\nhttp://secunia.com/product/5949/\nSymantec LiveUpdate for Macintosh 3.x\nhttp://secunia.com/product/5954/\n\nDESCRIPTION:\nA vulnerability has been reported in Symantec LiveUpdate for\nMachintosh, which can be exploited by malicious, local users to gain\nescalated privileges. \n\nSOLUTION:\nApply latest LiveUpdate patch. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits DigitalMunition.com. \n\nORIGINAL ADVISORY:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-1836" }, { "db": "BID", "id": "17571" }, { "db": "VULHUB", "id": "VHN-17944" }, { "db": "PACKETSTORM", "id": "45507" } ], "trust": 1.35 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "17571", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2006-1836", "trust": 2.0 }, { "db": "SECUNIA", "id": "19682", "trust": 1.8 }, { "db": "SREASON", "id": "100", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-1386", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015953", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200604-296", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20060418 [SYMANTEC SECURITY ADVISORY] LIVEUPDATE FOR MACINTOSH LOCAL PRIVILEGE ESCALATION", "trust": 0.6 }, { "db": "XF", "id": "25839", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-17944", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "45507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-17944" }, { "db": "BID", "id": "17571" }, { "db": "PACKETSTORM", "id": "45507" }, { "db": "CNNVD", "id": "CNNVD-200604-296" }, { "db": "NVD", "id": "CVE-2006-1836" } ] }, "id": "VAR-200604-0363", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-17944" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:57:42.893000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-1836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://securityresponse.symantec.com/avcenter/security/content/2006.04.17b.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/17571" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015953" }, { "trust": 1.7, "url": "http://secunia.com/advisories/19682" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/100" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/431318/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/1386" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/25839" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2006.04.17b.html" }, { "trust": 0.1, "url": "http://secunia.com/product/5953/" }, { "trust": 0.1, "url": "http://secunia.com/product/5950/" }, { "trust": 0.1, "url": "http://secunia.com/product/5951/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5954/" }, { "trust": 0.1, "url": "http://secunia.com/product/5952/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/19682/" }, { "trust": 0.1, "url": "http://secunia.com/product/5949/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5948/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-17944" }, { "db": "BID", "id": "17571" }, { "db": "PACKETSTORM", "id": "45507" }, { "db": "CNNVD", "id": "CNNVD-200604-296" }, { "db": "NVD", "id": "CVE-2006-1836" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-17944" }, { "db": "BID", "id": "17571" }, { "db": "PACKETSTORM", "id": "45507" }, { "db": "CNNVD", "id": "CNNVD-200604-296" }, { "db": "NVD", "id": "CVE-2006-1836" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-04-19T00:00:00", "db": "VULHUB", "id": "VHN-17944" }, { "date": "2006-04-17T00:00:00", "db": "BID", "id": "17571" }, { "date": "2006-04-19T19:19:57", "db": "PACKETSTORM", "id": "45507" }, { "date": "2006-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200604-296" }, { "date": "2006-04-19T16:06:00", "db": "NVD", "id": "CVE-2006-1836" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-17944" }, { "date": "2007-06-27T19:08:00", "db": "BID", "id": "17571" }, { "date": "2006-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200604-296" }, { "date": "2024-11-21T00:09:52.760000", "db": "NVD", "id": "CVE-2006-1836" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "17571" }, { "db": "PACKETSTORM", "id": "45507" }, { "db": "CNNVD", "id": "CNNVD-200604-296" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec LiveUpdate for Macintosh Local privilege elevation vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-200604-296" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "17571" }, { "db": "CNNVD", "id": "CNNVD-200604-296" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.