ID

VAR-200605-0399


CVE

CVE-2006-2630


TITLE

Symantec products vulnerable to buffer overflow

Trust: 0.8

sources: CERT/CC: VU#404910

DESCRIPTION

Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors. Symantec products are vulnerable to a stack-based buffer overflow. Symantec AntiVirus Corporate Edition 10.1 and Symantec Client Security 3.1 are currently known to be vulnerable to this issue. All supported platforms are affected including Microsoft Windows and Novell Netware. Symantec AntiVirus is a very popular antivirus solution. The remote management protocol used by the affected products for communication is a proprietary message-based protocol with two levels of encapsulation. The outer layer consists of message headers, which may be message type 10, which means requesting Rtvscan.exe, or type 20 or 30, which means forwarding SSL negotiation. If SSL is created for a TCP connection, subsequent communication is encrypted, although there is still plaintext in the private format. The data of the type 10 message contains its own header and message body, both of which are processed by Rtvscan.exe. There is a command field in this header, which specifies the operation to be performed and the format of the message body data. COM_FORWARD_LOG (0x24) The command handler does not use strncat correctly, allowing to overwrite the 0x180 byte stack buffer with arbitrary data. If the first string in the COM_FORWARD_LOG request contains a backslash, one of two strncat calls is performed: * If the string contains commas but no double quotes: strncat(dest, src, 0x17A - strlen(src )); * Otherwise: strncat(dest, src, 0x17C - strlen(src)); If the length of the source string exceeds 0x17A or 0x17C characters respectively, the arithmetic will underflow, resulting in a large memory copy size. This might allow appending this source string to the buffer, overwriting the stack with 64KB of data (null characters excluded). Rtvscan.exe is compiled with the Visual Studio /GS security option and includes stack canary checks. But an attacker can bypass this security measure by overriding and controlling the exception handler registration. SOLUTION: Apply patches (see patch matrix in vendor advisory). PROVIDED AND/OR DISCOVERED BY: eEye Digital Security ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.05.25.html eEye Digital Security: http://www.eeye.com/html/research/upcoming/20060524.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-2630 // CERT/CC: VU#404910 // BID: 18107 // VULHUB: VHN-18738 // PACKETSTORM: 46794

AFFECTED PRODUCTS

vendor:symantecmodel:client securityscope:eqversion:3.1

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.394

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.400

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.0

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2020

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2010

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2020

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2021

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2010

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.0

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.1.400

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.1

Trust: 1.0

vendor:symantecmodel: - scope: - version: -

Trust: 0.8

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.446

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2010

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.1.401

Trust: 0.3

vendor:symantecmodel:client security mr7 buildscope:neversion:1.0.18.01.464

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:neversion:1.0.18.01.446

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition 1.425a/bscope:neversion:8.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.01.9378

Trust: 0.3

vendor:symantecmodel:client security b8.01.9374scope:neversion:1.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.394

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.434

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.1.396

Trust: 0.3

vendor:symantecmodel:client security mr5 buildscope:neversion:1.0.18.01.457

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.1.1.377

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:1.1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.1.1.366

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:2.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2001

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition build 8.1.1.314ascope:neversion:8.1.1

Trust: 0.3

vendor:symantecmodel:client security mr6 buildscope:neversion:1.0.18.01.460

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.400

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.0

Trust: 0.3

vendor:symantecmodel:client security mr3 buildscope:neversion:1.0.18.01.434

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.3.1000

Trust: 0.3

vendor:symantecmodel:client security b8.01.9378scope:neversion:1.0.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.1.18.1.1.323

Trust: 0.3

vendor:symantecmodel:client security mr3 buildscope:neversion:1.1.18.1.1.323

Trust: 0.3

vendor:symantecmodel:client security mr2 b9.0.2.1000scope:neversion:2.0.2

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.1.401

Trust: 0.3

vendor:symantecmodel:client security mr1 b8.01.425a/bscope:neversion:1.0.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.2.1000

Trust: 0.3

vendor:symantecmodel:client security (scfscope:neversion:2.07.1)

Trust: 0.3

vendor:symantecmodel:client security stm buildscope:neversion:2.09.0.0.338

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.01.501

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.0.2.2002

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.460

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.1.18.1.1.329

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.0.2.2011

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2020

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:neversion:1.1.18.1.1.329

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:1.0.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.0.2.2021

Trust: 0.3

vendor:symantecmodel:client security mr2 b8.01.429cscope:neversion:1.0.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition .0.825ascope:neversion:8.1

Trust: 0.3

vendor:symantecmodel:client security mr3 b9.0.3.1000scope:neversion:2.0.3

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.1.18.1.1.319

Trust: 0.3

vendor:symantecmodel:client security mr5 buildscope:neversion:1.1.18.1.1.336

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.1.1

Trust: 0.3

vendor:symantecmodel:client security mr9 b8.01.501scope:neversion:1.0.1

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.0.2.2002

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.01.9374

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.1.396

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.437

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.457

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.0.338

Trust: 0.3

vendor:symantecmodel:client security mr2 buildscope:neversion:1.1.18.1.1.319

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:1.0

Trust: 0.3

vendor:symantecmodel:client security mr1 build 8.1.1.314ascope:neversion:1.1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.464

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2001

Trust: 0.3

vendor:symantecmodel:client security mr8 buildscope:neversion:1.0.18.01.471

Trust: 0.3

vendor:symantecmodel:client security mr1 b9.0.1.1000scope:neversion:2.0.1

Trust: 0.3

vendor:symantecmodel:client security buildscope:neversion:1.0.18.01.437

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition 1.429cscope:neversion:8.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.1.1.1000

Trust: 0.3

vendor:symantecmodel:client security mr6 b8.1.1.266scope:neversion:1.1.1

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.0.2.2011

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:9.0.4

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:8.01

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.0.2.2021

Trust: 0.3

vendor:symantecmodel:client security stm b8.1.0.825ascope:neversion:1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition buildscope:neversion:8.18.01.471

Trust: 0.3

sources: CERT/CC: VU#404910 // BID: 18107 // CNNVD: CNNVD-200605-498 // NVD: CVE-2006-2630

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2630
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#404910
value: 24.30

Trust: 0.8

CNNVD: CNNVD-200605-498
value: CRITICAL

Trust: 0.6

VULHUB: VHN-18738
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2630
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18738
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#404910 // VULHUB: VHN-18738 // CNNVD: CNNVD-200605-498 // NVD: CVE-2006-2630

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2630

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200605-498

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200605-498

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-18738

EXTERNAL IDS

db:BIDid:18107

Trust: 2.8

db:SECTRACKid:1016162

Trust: 2.5

db:CERT/CCid:VU#404910

Trust: 2.5

db:NVDid:CVE-2006-2630

Trust: 2.0

db:SECUNIAid:20318

Trust: 1.8

db:SECTRACKid:1016161

Trust: 1.7

db:VUPENid:ADV-2006-2005

Trust: 1.7

db:CNNVDid:CNNVD-200605-498

Trust: 0.7

db:XFid:26706

Trust: 0.6

db:EEYEid:EEYEB-20060524

Trust: 0.6

db:BUGTRAQid:20060527 SYMANTEC ANTIVIRUS SOFTWARE EXPOSES COMPUTERS

Trust: 0.6

db:FULLDISCid:20060526 NEW SYMANTEC VULN

Trust: 0.6

db:PACKETSTORMid:83223

Trust: 0.1

db:EXPLOIT-DBid:16830

Trust: 0.1

db:SEEBUGid:SSVID-88855

Trust: 0.1

db:SEEBUGid:SSVID-71332

Trust: 0.1

db:VULHUBid:VHN-18738

Trust: 0.1

db:PACKETSTORMid:46794

Trust: 0.1

sources: CERT/CC: VU#404910 // VULHUB: VHN-18738 // BID: 18107 // PACKETSTORM: 46794 // CNNVD: CNNVD-200605-498 // NVD: CVE-2006-2630

REFERENCES

url:http://www.eeye.com/html/research/upcoming/20060524.html

Trust: 2.9

url:http://securityresponse.symantec.com/avcenter/security/content/2006.05.25.html

Trust: 2.1

url:http://www.securityfocus.com/bid/18107

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/404910

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-may/046355.html

Trust: 1.7

url:http://securitytracker.com/id?1016161

Trust: 1.7

url:http://securitytracker.com/id?1016162

Trust: 1.7

url:http://secunia.com/advisories/20318

Trust: 1.7

url:http://www.securityfocus.com/archive/1/435200/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/2005

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26706

Trust: 1.1

url:http://www.eeye.com/html/research/advisories/ad20060612.html

Trust: 0.8

url:http://www.symantec.com/avcenter/security/content/2006.05.25.html

Trust: 0.8

url:http://www.securityfocus.com/bid/18107/

Trust: 0.8

url:http://securitytracker.com/alerts/2006/may/1016162.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/2005

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/435200/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26706

Trust: 0.6

url:https://www.immunityinc.com/downloads/immpartners/symantec_rm.tar

Trust: 0.3

url:http://www.symantec.com/products/enterprise?c=prodinfo&refid=805

Trust: 0.3

url:http://securityresponse.symantec.com/avcenter/security/symantecadvisories.html

Trust: 0.3

url:http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-112810-5302-99&tabid=1

Trust: 0.3

url:http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2006-122314-5625-99&tabid=2

Trust: 0.3

url:/archive/1/436860

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6649/

Trust: 0.1

url:http://secunia.com/advisories/20318/

Trust: 0.1

url:http://secunia.com/product/5555/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#404910 // VULHUB: VHN-18738 // BID: 18107 // PACKETSTORM: 46794 // CNNVD: CNNVD-200605-498 // NVD: CVE-2006-2630

CREDITS

eEye info@eEye.com Derek Soeder dsoeder@eeye.com

Trust: 0.6

sources: CNNVD: CNNVD-200605-498

SOURCES

db:CERT/CCid:VU#404910
db:VULHUBid:VHN-18738
db:BIDid:18107
db:PACKETSTORMid:46794
db:CNNVDid:CNNVD-200605-498
db:NVDid:CVE-2006-2630

LAST UPDATE DATE

2024-08-14T14:00:20.487000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#404910date:2006-06-13T00:00:00
db:VULHUBid:VHN-18738date:2018-10-18T00:00:00
db:BIDid:18107date:2007-11-01T16:26:00
db:CNNVDid:CNNVD-200605-498date:2007-02-08T00:00:00
db:NVDid:CVE-2006-2630date:2018-10-18T16:40:59.917

SOURCES RELEASE DATE

db:CERT/CCid:VU#404910date:2006-05-30T00:00:00
db:VULHUBid:VHN-18738date:2006-05-27T00:00:00
db:BIDid:18107date:2006-05-24T00:00:00
db:PACKETSTORMid:46794date:2006-05-29T22:46:46
db:CNNVDid:CNNVD-200605-498date:2006-05-27T00:00:00
db:NVDid:CVE-2006-2630date:2006-05-27T21:02:00