var-200707-0450
Vulnerability from variot
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \symTDI\, which results in memory overwrite. Applications running the SYMTDI.SYS device driver are prone to a privilege-escalation vulnerability because the driver fails to adequately sanitize user-supplied input. Local attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. A successful exploit will completely compromise affected computers. Failed exploit attempts will likely cause the computer to crash. Symantec AntiVirus is a very popular antivirus solution. instruction. Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability
iDefense Security Advisory 07.11.07 http://labs.idefense.com/intelligence/vulnerabilities/ Jul 11, 2007
I. BACKGROUND
Symantec has a wide range of Anti-Virus and Internet Security products that are designed to protect users from viruses and other harmful software. More information can be found on the Symantec site at the following URL.
http://www.symantec.com/
II.
The vulnerability specifically exists due to improper address space validation when the \symTDI\ device driver processes IOCTL 0x83022323. An attacker can overwrite an arbitrary address, including code segments, with a constant double word value by supplying a specially crafted Irp to the IOCTL handler function.
III. ANALYSIS
Exploitation allows an attacker to obtain elevated privileges by exploiting a kernel-mode driver. This could allow the attacker to gain complete control of the affected system.
Note that since the attacker can only overwrite with a constant double-word value, exploitation is not completely straight forward. However, this does not significantly impact the difficulty of exploitation since code segments can be overwritten within the kernel.
IV. DETECTION
iDefense confirmed this vulnerability in version 5.5.1.6 of Symantec's symtdi.sys device driver as included with version 10 of Symantec AntiVirus Corporate Edition. Previous versions and related products that contain the affected driver are suspected vulnerable.
V. WORKAROUND
iDefense is currently unaware of any effective workaround for this issue.
VI. VENDOR RESPONSE
Symantec has addressed this vulnerability by releasing updated versions of the SymTDI.sys device driver. The updated driver has been made available via LiveUpdate. For more information consult Symantec's advisory at the following URL.
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3673 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
01/10/2007 Initial vendor notification 01/11/2007 Initial vendor response 07/11/2007 Coordinated public disclosure
IX. CREDIT
This vulnerability was reported to iDefense by Zohiartze Herce.
Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events http://labs.idefense.com/
X. LEGAL NOTICES
Copyright © 2007 iDefense, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. Please see the vendor's advisory for details.
PROVIDED AND/OR DISCOVERED BY: Zohiartze Herce, reported via iDefense Labs.
ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html
iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200707-0450", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton antispam", "scope": "eq", "trust": 2.4, "vendor": "symantec", "version": "2005" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2.0" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "norton system works", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "norton system works", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2.0 to 3.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition 9 to 10.1" }, { "model": "norton internet security", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton personal firewall", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton systemworks", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2005 and 2006" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.6.6000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.1.1008" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.41000" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1007" }, { "model": "client security mr6", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.394" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.0.359" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.394" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.1.1001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.600" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.400" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.6000" }, { "model": "client security mr6 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.6-1100" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.400" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.4" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.401" }, { "model": "client security mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.4-4010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.396" }, { "model": "antivirus corporate edition mr6", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4.4010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1000" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5" }, { "model": "antivirus corporate edition mr6 mp1 build", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "9.0.6-1100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1008" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.396" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.51100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.2" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2020" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2010" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2001" }, { "model": "norton antispam", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.1.1007" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.0.359" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2011" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2021" }, { "model": "client security mr6 mp1", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.401" }, { "model": "antivirus corporate edition mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4-4010" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0.2.2002" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.41000" } ], "sources": [ { "db": "BID", "id": "22351" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "CNNVD", "id": "CNNVD-200707-277" }, { "db": "NVD", "id": "CVE-2007-3673" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antispam", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_system_works", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005845" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zohiartze Herce", "sources": [ { "db": "CNNVD", "id": "CNNVD-200707-277" } ], "trust": 0.6 }, "cve": "CVE-2007-3673", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2007-3673", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-27035", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-3673", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-3673", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200707-277", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-27035", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-27035" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "CNNVD", "id": "CNNVD-200707-277" }, { "db": "NVD", "id": "CVE-2007-3673" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite. Applications running the SYMTDI.SYS device driver are prone to a privilege-escalation vulnerability because the driver fails to adequately sanitize user-supplied input. \nLocal attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. A successful exploit will completely compromise affected computers. Failed exploit attempts will likely cause the computer to crash. Symantec AntiVirus is a very popular antivirus solution. instruction. Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability\n\niDefense Security Advisory 07.11.07\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nJul 11, 2007\n\nI. BACKGROUND\n\nSymantec has a wide range of Anti-Virus and Internet Security products\nthat are designed to protect users from viruses and other harmful\nsoftware. More information can be found on the Symantec site at the\nfollowing URL. \n\nhttp://www.symantec.com/\n\nII. \n\nThe vulnerability specifically exists due to improper address space\nvalidation when the \\\\symTDI\\ device driver processes IOCTL 0x83022323. \nAn attacker can overwrite an arbitrary address, including code segments,\nwith a constant double word value by supplying a specially crafted Irp\nto the IOCTL handler function. \n\nIII. ANALYSIS\n\nExploitation allows an attacker to obtain elevated privileges by\nexploiting a kernel-mode driver. This could allow the attacker to gain\ncomplete control of the affected system. \n\nNote that since the attacker can only overwrite with a constant\ndouble-word value, exploitation is not completely straight forward. \nHowever, this does not significantly impact the difficulty of\nexploitation since code segments can be overwritten within the kernel. \n\nIV. DETECTION\n\niDefense confirmed this vulnerability in version 5.5.1.6 of Symantec\u0027s\nsymtdi.sys device driver as included with version 10 of Symantec\nAntiVirus Corporate Edition. Previous versions and related products\nthat contain the affected driver are suspected vulnerable. \n\nV. WORKAROUND\n\niDefense is currently unaware of any effective workaround for this\nissue. \n\nVI. VENDOR RESPONSE\n\nSymantec has addressed this vulnerability by releasing updated versions\nof the SymTDI.sys device driver. The updated driver has been made\navailable via LiveUpdate. For more information consult Symantec\u0027s\nadvisory at the following URL. \n\nhttp://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2007-3673 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n01/10/2007 Initial vendor notification\n01/11/2007 Initial vendor response\n07/11/2007 Coordinated public disclosure\n\nIX. CREDIT\n\nThis vulnerability was reported to iDefense by Zohiartze Herce. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \u00a9 2007 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Full Featured Secunia Network Software Inspector (NSI) is now\navailable:\nhttp://secunia.com/network_software_inspector/\n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. Please see the vendor\u0027s advisory for\ndetails. \n\nPROVIDED AND/OR DISCOVERED BY:\nZohiartze Herce, reported via iDefense Labs. \n\nORIGINAL ADVISORY:\nSymantec:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html\n\niDefense Labs:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-3673" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "BID", "id": "22351" }, { "db": "VULHUB", "id": "VHN-27035" }, { "db": "PACKETSTORM", "id": "57669" }, { "db": "PACKETSTORM", "id": "57695" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-27035", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27035" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-3673", "trust": 2.9 }, { "db": "BID", "id": "22351", "trust": 2.0 }, { "db": "SECUNIA", "id": "26042", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-2507", "trust": 1.7 }, { "db": "SECTRACK", "id": "1018372", "trust": 1.7 }, { "db": "OSVDB", "id": "36117", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2007-005845", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200707-277", "trust": 0.7 }, { "db": "IDEFENSE", "id": "20070711 SYMANTEC ANTIVIRUS SYMTDI.SYS LOCAL PRIVILEGE ESCALATION VULNERABILITY", "trust": 0.6 }, { "db": "XF", "id": "35347", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "57669", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "4178", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-27035", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "57695", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27035" }, { "db": "BID", "id": "22351" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "PACKETSTORM", "id": "57669" }, { "db": "PACKETSTORM", "id": "57695" }, { "db": "CNNVD", "id": "CNNVD-200707-277" }, { "db": "NVD", "id": "CVE-2007-3673" } ] }, "id": "VAR-200707-0450", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-27035" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:09:52.405000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM07-018", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2007.07.11d.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005845" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-3673" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" }, { "trust": 1.9, "url": "http://securityresponse.symantec.com/avcenter/security/content/2007.07.11d.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22351" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1018372" }, { "trust": 1.7, "url": "http://secunia.com/advisories/26042" }, { "trust": 1.1, "url": "http://osvdb.org/36117" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3673" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3673" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/2507" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/35347" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2007.07.11d.html" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "/archive/1/473392" }, { "trust": 0.1, "url": "http://www.symantec.com/" }, { "trust": 0.1, "url": "http://cve.mitre.org/)," }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-3673" }, { "trust": 0.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/" }, { "trust": 0.1, "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php" }, { "trust": 0.1, "url": "http://labs.idefense.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/4009/" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/product/6636/" }, { "trust": 0.1, "url": "http://secunia.com/product/6649/" }, { "trust": 0.1, "url": "http://secunia.com/product/3478/" }, { "trust": 0.1, "url": "http://secunia.com/product/14763/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26042/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/4847/" }, { "trust": 0.1, "url": "http://secunia.com/product/4848/" }, { "trust": 0.1, "url": "http://secunia.com/product/6637/" }, { "trust": 0.1, "url": "http://secunia.com/product/6634/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/6638/" }, { "trust": 0.1, "url": "http://secunia.com/product/3549/" }, { "trust": 0.1, "url": "http://secunia.com/product/6635/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5555/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27035" }, { "db": "BID", "id": "22351" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "PACKETSTORM", "id": "57669" }, { "db": "PACKETSTORM", "id": "57695" }, { "db": "CNNVD", "id": "CNNVD-200707-277" }, { "db": "NVD", "id": "CVE-2007-3673" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-27035" }, { "db": "BID", "id": "22351" }, { "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "db": "PACKETSTORM", "id": "57669" }, { "db": "PACKETSTORM", "id": "57695" }, { "db": "CNNVD", "id": "CNNVD-200707-277" }, { "db": "NVD", "id": "CVE-2007-3673" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-07-15T00:00:00", "db": "VULHUB", "id": "VHN-27035" }, { "date": "2007-07-11T00:00:00", "db": "BID", "id": "22351" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "date": "2007-07-12T02:12:12", "db": "PACKETSTORM", "id": "57669" }, { "date": "2007-07-13T00:55:11", "db": "PACKETSTORM", "id": "57695" }, { "date": "2007-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200707-277" }, { "date": "2007-07-15T21:30:00", "db": "NVD", "id": "CVE-2007-3673" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-27035" }, { "date": "2007-11-01T15:56:00", "db": "BID", "id": "22351" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005845" }, { "date": "2007-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200707-277" }, { "date": "2024-11-21T00:33:47.907000", "db": "NVD", "id": "CVE-2007-3673" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "22351" }, { "db": "PACKETSTORM", "id": "57669" }, { "db": "PACKETSTORM", "id": "57695" }, { "db": "CNNVD", "id": "CNNVD-200707-277" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec AntiVirus Corporate Edition Etc. Symantec symtdi.sys Vulnerability gained in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005845" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200707-277" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.