[NT] Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error Vulnerability



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error
Vulnerability
------------------------------------------------------------------------


SUMMARY


<http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008> Norton Internet Security 2008 is "a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic". Remote exploitation of a design error in an ActiveX control installed with Symantec Norton Internet Security 2008 could allow for the execution of arbitrary code.

DETAILS

Vulnerable Systems:
* Norton Internet Security 2008 version 2.7.0.1

Norton Internet Security 2008 installs the following ActiveX control which
is registered as safe for scripting:
Progid: SymAData.ActiveDataInfo.1
Clsid: 3451DEDE-631F-421c-8127-FD793AFC6CC8
File: C:\PROGRA~1\COMMON~1\SYMANT~1\SUPPOR~1\SymAData.dll
Version: 2.7.0.1

This control contains functionality designed to allow Symantec to remotely
execute programs on the target machine.

Analysis:
Exploitation allows attackers to execute arbitrary code with the
privileges of the currently logged in user. In order for exploitation to
occur, an attacker would have to lure a vulnerable user to a malicious web
site.

While this control is marked as safe for scripting, the control has been
designed so that it can only be run from the "symantec.com" domain. In
practice this requirement can be bypassed through the use of any Cross
Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation
could also occur through the use of DNS poisoning attacks.

Workaround:
Setting the kill-bit for this control will prevent it from being loaded
within Internet Explorer. However, doing so will prevent legitimate use of
the control.

Vendor response:
Symantec has addressed this vulnerability by releasing updates. For more
information, refer to their advisory at the following URL.
<http://www.symantec.com/avcenter/security/Content/2008.04.02a.html>
http://www.symantec.com/avcenter/security/Content/2008.04.02a.html

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0313>
CVE-2008-0313

Disclosure Timeline:
12/14/2007 - Initial vendor notification
12/14/2007 - Initial vendor response
04/02/2008 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense Labs.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=678>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=678



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages