ID

VAR-200706-0271


CVE

CVE-2007-3022


TITLE

Symantec Client Security and SAV CE Used in etc. Symantec Reporting Server Vulnerable to brute force attacks

Trust: 0.8

sources: JVNDB: JVNDB-2007-005637

DESCRIPTION

Symantec Reporting Server 1.0.197.0, and other versions before 1.0.224.0, as used in Symantec Client Security 3.1 and later, and Symantec AntiVirus Corporate Edition (SAV CE) 10.1 and later, displays the password hash for a user after a failed login attempt, which makes it easier for remote attackers to conduct brute force attacks. Symantec Reporting Server is prone to an information-disclosure vulnerability. Successfully exploiting this issue would allow an attacker to obtain sensitive information that will allow the attacker to gain administrative access to the server database. Updates have been released to address the vulnerability. The attacker would not automatically have access to other programs on the computer, unless the same account and password are used for other programs. As a best practice, the accounts created for managing Reporting Server should not use the same id and password as the users\x92 network login credentials. During the internal review of the issue, Symantec engineers also identified and fixed aseparate issue which could allow an attacker disable the authentication system for the SCS Reporting server. - Ensuring that the Console and Reporting are never visible external to the network greatly reduces opportunities for unauthorized remote access. - User accounts for Reporting Server should be different than the user\x92s network login account. Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue. As a part of normal best practices, users should keep vendor-supplied patches for all application software and operating systems up-to-date. Symantec strongly recommends any affected customers update SAV Reporting immediately to protect against possible attempts to exploit this vulnerability. Credit Symantec would like to thank Mikko Korppi for reporting this issue, and coordinating with us on the response. CVE This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-3022 to this issue Updates Any future updates to this advisory, if required, will be posted on the Symantec Advisory page: http://www.symantec.com/avcenter/security/Content/2007.06.05.html -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Symantec Product Security Team. ________________________________________ Symantec takes the security and proper functionality of its products very seriously. As founding members of the Organization for Internet Safety (OISafety), Symantec follows the principles of responsible disclosure. Symantec also subscribes to the vulnerability guidelines outlined by the National Infrastructure Advisory Council (NIAC). Please contact secure@symantec.com if you feel you have discovered security issue with a Symantec product. Copyright (c) 2007 by Symantec Corp. -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.6 (Build 6060) iQEVAwUBRmW1Af9Lqygkbb6BAQifiwf+NfiU2gdBPuwRVUAQ/sxHEPCEq7E6TI8g VXBzyVpjUla772Fcko3NPXr3pVAVsJCvEIH5rhiWWGfkVIvaOLBBRVoUr8PED6Nd HaqlKAvj4PPPygRHGPjos/vaoI03N2MoIAJtjBVFqc/23Yz/0f5NDDjvj5pvzY19 Tf7XyfqYkShgxAqbu8VCb0x8s2Ge6RADFWRI7MHhRuRTkoRVPKoIGHQLuIE+b/S4 /Hu4FpU6QDEfeyat5h9ty9lWtD+6sPWIQcM9ieylRIxZ5JAKJuGSKVt7o8QjxLzg EjVYtWcBLJAg1Ky/apFNIr6H9TPKwJkuXJHtp3qG+LFR9MQKk51U0w== =N+kW -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2007-3022 // JVNDB: JVNDB-2007-005637 // BID: 24312 // VULHUB: VHN-26384 // PACKETSTORM: 57064

AFFECTED PRODUCTS

vendor:symantecmodel:client securityscope:eqversion:3.1.401

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.400

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.396

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.394

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2021

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.1.401

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.1

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.1.400

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:10.1.396

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:3.1

Trust: 1.3

vendor:symantecmodel:reporting serverscope:lteversion:1.0.197.0

Trust: 1.0

vendor:symantecmodel:reporting serverscope:eqversion:1.0.197.0

Trust: 0.9

vendor:symantecmodel:client securityscope:eqversion:3.1 and later

Trust: 0.8

vendor:symantecmodel:norton antivirusscope:eqversion:corporate edition (sav ce) 10.1 and later

Trust: 0.8

vendor:symantecmodel:reporting serverscope:ltversion:1.0.197.0 and 1.0.224.0

Trust: 0.8

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.401

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.400

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.396

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.394

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:reporting serverscope:neversion:1.0.224.0

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.1.6.6000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:neversion:10.1.6.600

Trust: 0.3

sources: BID: 24312 // JVNDB: JVNDB-2007-005637 // CNNVD: CNNVD-200706-053 // NVD: CVE-2007-3022

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3022
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3022
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200706-053
value: MEDIUM

Trust: 0.6

VULHUB: VHN-26384
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3022
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-26384
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-26384 // JVNDB: JVNDB-2007-005637 // CNNVD: CNNVD-200706-053 // NVD: CVE-2007-3022

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3022

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200706-053

TYPE

Design Error

Trust: 0.9

sources: BID: 24312 // CNNVD: CNNVD-200706-053

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005637

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-26384

PATCH

title:SYM07-011url:http://www.symantec.com/avcenter/security/Content/2007.06.05.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-005637

EXTERNAL IDS

db:NVDid:CVE-2007-3022

Trust: 2.9

db:BIDid:24312

Trust: 2.0

db:SECTRACKid:1018196

Trust: 1.7

db:VUPENid:ADV-2007-2074

Trust: 1.7

db:SECUNIAid:25543

Trust: 1.7

db:OSVDBid:36108

Trust: 1.1

db:JVNDBid:JVNDB-2007-005637

Trust: 0.8

db:CNNVDid:CNNVD-200706-053

Trust: 0.7

db:XFid:34740

Trust: 0.6

db:PACKETSTORMid:57064

Trust: 0.2

db:VULHUBid:VHN-26384

Trust: 0.1

sources: VULHUB: VHN-26384 // BID: 24312 // JVNDB: JVNDB-2007-005637 // PACKETSTORM: 57064 // CNNVD: CNNVD-200706-053 // NVD: CVE-2007-3022

REFERENCES

url:http://www.symantec.com/avcenter/security/content/2007.06.05.html

Trust: 2.1

url:http://www.securityfocus.com/bid/24312

Trust: 1.7

url:http://www.securitytracker.com/id?1018196

Trust: 1.7

url:http://secunia.com/advisories/25543

Trust: 1.7

url:http://osvdb.org/36108

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2074

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34740

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3022

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3022

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/34740

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2074

Trust: 0.6

url:http://www.symantec.com/smb/products/overview.jsp?pcid=end_sec&pvid=scs31

Trust: 0.3

url:http://www.symantec.com/enterprise/products/sysreq.jsp?pcid=1322&pvid=805_1

Trust: 0.3

url:/archive/1/470606

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2007-3022

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

sources: VULHUB: VHN-26384 // BID: 24312 // JVNDB: JVNDB-2007-005637 // PACKETSTORM: 57064 // CNNVD: CNNVD-200706-053 // NVD: CVE-2007-3022

CREDITS

Mikko Korppi

Trust: 0.6

sources: CNNVD: CNNVD-200706-053

SOURCES

db:VULHUBid:VHN-26384
db:BIDid:24312
db:JVNDBid:JVNDB-2007-005637
db:PACKETSTORMid:57064
db:CNNVDid:CNNVD-200706-053
db:NVDid:CVE-2007-3022

LAST UPDATE DATE

2024-11-23T22:36:13.697000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-26384date:2017-07-29T00:00:00
db:BIDid:24312date:2007-06-06T16:40:00
db:JVNDBid:JVNDB-2007-005637date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200706-053date:2007-06-11T00:00:00
db:NVDid:CVE-2007-3022date:2024-11-21T00:32:13.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-26384date:2007-06-05T00:00:00
db:BIDid:24312date:2007-06-05T00:00:00
db:JVNDBid:JVNDB-2007-005637date:2012-12-20T00:00:00
db:PACKETSTORMid:57064date:2007-06-07T06:01:15
db:CNNVDid:CNNVD-200706-053date:2007-06-05T00:00:00
db:NVDid:CVE-2007-3022date:2007-06-05T21:30:00