[NT] Symantec Altiris Deployment Solution TFTP/MTFTP Service Directory Traversal Vulnerability
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 1 Nov 2007 11:06:39 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Symantec Altiris Deployment Solution TFTP/MTFTP Service Directory
Altiris Deployment Solution is "an automated OS deployment solution that
is used for deploying and managing servers, desktops, and notebooks from a
central location". Remote exploitation of a directory traversal
vulnerability in Symantec's Altiris Deployment Solution products could
allow attackers to gain read access to arbitrary files hosted on the
* Altiris Deployment Solution for Windows version 6.8 (pxemtftp.exe
Altiris Deployment Solution includes a tftp/mtftp server within its
optional PXE server component which suffers from a directory traversal
condition. The server runs with SYSTEM level privileges and allows
unauthenticated attackers to download any file on the system.
Exploitation allows attackers to read arbitrary files from the server
machine. The tftp/mftp daemon runs with SYSTEM level privileges, so any
file readable by SYSTEM with a known file path can be downloaded without
If the PXE server component is not required in your environment it should
Symantec Altiris has addressed this vulnerability by releasing a HotFix.
More information is available in Symantec's advisory at the following URL:
07/13/2007 - Initial vendor notification
07/16/2007 - Initial vendor response
10/31/2007 - Public disclosure
The information has been provided by iDefense Labs.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Macrovision InstallShield Update Service ActiveX Unsafe Method Vulnerability
- Next by Date: [TOOL] Bunny The Fuzzer
- Previous by thread: [NT] Macrovision InstallShield Update Service ActiveX Unsafe Method Vulnerability
- Next by thread: [TOOL] Bunny The Fuzzer