Overview
Symantec Endpoint Protection Client 11.x and 12.x contains a kernel pool overflow vulnerability.
Description
CWE-788: Access of Memory Location After End of Buffer An attacker logged into a Windows XP, Vista, 7, or 8 system as an unprivileged user is able to cause a kernel pool overflow in the sysplant driver with specially crafted IOCTL code. The sysplant driver is part of the Application and Device Control functionality in Symantec Endpoint Protection (SEP) client 11.x and 12.x. This feature is enabled by default in SEP client 11.x and 12.x. |
Impact
An attacker with user credentials may be able to elevate privileges to SYSTEM and gain full control of the system. |
Solution
Apply an Update |
If the patch is unavailable or cannot be installed, consider the following workaround: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:L/AC:L/Au:S/C:C/I:C/A:C |
Temporal | 6.1 | E:F/RL:W/RC:C |
Environmental | 4.6 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND |
References
- http://www.symantec.com/business/support/index?page=content&id=TECH103259
- http://www.symantec.com/security_response/securityupdates/list.jsp?fid=security_advisory
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140804_00
- http://cwe.mitre.org/data/definitions/788.html
Acknowledgements
Thanks to Matteo Memelli for reporting this vulnerability.
This document was written by Chris King.
Other Information
CVE IDs: | CVE-2014-3434 |
Date Public: | 2014-08-04 |
Date First Published: | 2014-08-04 |
Date Last Updated: | 2014-08-04 19:56 UTC |
Document Revision: | 22 |