Overview
Multiple Symantec Antivirus products fail to properly handle CAB files, which may allow a remote, unauthenticated attacker to execute arbitrary code with SYSTEM privileges.
Description
The CAB file decomposer component that is used by multiple Symantec Antivirus products fails to properly handle malformed CAB files, which can result in memory corruption. Successful exploitation may result in arbitrary code execution as the result of a file being scanned. We have confirmed that Symantec Endpoint Protection 11, which uses dec_abi.dll, and Symantec Scan Engine 5.2, which uses Dec2CAB.dll, are affected. Symantec also reports that Symantec Endpoint Endpoint Protection 12.0, AntiVirus Corporate Edition 10.x, and Symantec Scan Engine 5.2.7.x and prior are affected. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges on a vulnerable system. |
Solution
Apply an update Symantec Endpoint Protection 11.0.5 through 11.0.7 MP3 users should apply the Decomposer Update Tool listed in Symantec Advisory SYM12-017. Symantec Endpoint Protection 12.0 and Symantec AntiVirus Corporate Edition users should update to Symantec Endpoint Protection version 12.1. Symantec Scan Engine users should update to version 5.2.8 or Symantec Protection Engine for Cloud Services 7.0.x. Please see Symantec Advisory SYM12-017 for more details. |
Use the Microsoft Enhanced Mitigation Experience Toolkit |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 7.8 | E:POC/RL:OF/RC:C |
Environmental | 7.8 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20121107_00
- http://www.symantec.com/endpoint-protection
- http://www.symantec.com/protection-engine-for-cloud-services
- http://support.microsoft.com/kb/2458544
- http://www.youtube.com/watch?v=28_LUs_g0u4
- http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
- http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
- http://blogs.technet.com/b/srd/archive/2010/12/08/on-the-effectiveness-of-dep-and-aslr.aspx
Acknowledgements
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2012-4953 |
Date Public: | 2012-11-05 |
Date First Published: | 2012-11-05 |
Date Last Updated: | 2012-11-15 20:44 UTC |
Document Revision: | 26 |