SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Symantec Critical System Protection Vendors:   Symantec
Symantec Critical System Protection Lets Remote Users Bypass Controls and Gain Elevated Privileges
SecurityTracker Alert ID:  1030190
SecurityTracker URL:  http://securitytracker.com/id/1030190
CVE Reference:   CVE-2013-5016   (Links to External Site)
Date:  May 3 2014
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.2.8 and prior versions
Description:   A vulnerability was reported in Symantec Critical System Protection. A remote user can bypass security controls.

A remote user can bypass default policy settings in certain cases to obtain potentially sensitive information on the target system or obtain elevated privileges.

The Windows version of Symantec Critical System Protection (SCSP) is affected.

[Editor's note: The vendor indicates that this is not a product vulnerability and that the reported policy bypass is due to an unpatched underlying operating system.]

Sanehdeep Singh reported this vulnerability.

Impact:   A remote user can bypass security controls and obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix (5.2.9).

The vendor's advisory is available at:

http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140502_00

Vendor URL:  www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140502_00 (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC