ID

VAR-200707-0450


CVE

CVE-2007-3673


TITLE

Symantec AntiVirus Corporate Edition Etc. Symantec symtdi.sys Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2007-005845

DESCRIPTION

Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite. Applications running the SYMTDI.SYS device driver are prone to a privilege-escalation vulnerability because the driver fails to adequately sanitize user-supplied input. Local attackers can exploit this issue to execute arbitrary code with SYSTEM-level privileges. A successful exploit will completely compromise affected computers. Failed exploit attempts will likely cause the computer to crash. Symantec AntiVirus is a very popular antivirus solution. instruction. Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability iDefense Security Advisory 07.11.07 http://labs.idefense.com/intelligence/vulnerabilities/ Jul 11, 2007 I. BACKGROUND Symantec has a wide range of Anti-Virus and Internet Security products that are designed to protect users from viruses and other harmful software. More information can be found on the Symantec site at the following URL. http://www.symantec.com/ II. The vulnerability specifically exists due to improper address space validation when the \\symTDI\ device driver processes IOCTL 0x83022323. An attacker can overwrite an arbitrary address, including code segments, with a constant double word value by supplying a specially crafted Irp to the IOCTL handler function. III. ANALYSIS Exploitation allows an attacker to obtain elevated privileges by exploiting a kernel-mode driver. This could allow the attacker to gain complete control of the affected system. Note that since the attacker can only overwrite with a constant double-word value, exploitation is not completely straight forward. However, this does not significantly impact the difficulty of exploitation since code segments can be overwritten within the kernel. IV. DETECTION iDefense confirmed this vulnerability in version 5.5.1.6 of Symantec's symtdi.sys device driver as included with version 10 of Symantec AntiVirus Corporate Edition. Previous versions and related products that contain the affected driver are suspected vulnerable. V. WORKAROUND iDefense is currently unaware of any effective workaround for this issue. VI. VENDOR RESPONSE Symantec has addressed this vulnerability by releasing updated versions of the SymTDI.sys device driver. The updated driver has been made available via LiveUpdate. For more information consult Symantec's advisory at the following URL. http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3673 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 01/10/2007 Initial vendor notification 01/11/2007 Initial vendor response 07/11/2007 Coordinated public disclosure IX. CREDIT This vulnerability was reported to iDefense by Zohiartze Herce. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright © 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. Please see the vendor's advisory for details. PROVIDED AND/OR DISCOVERED BY: Zohiartze Herce, reported via iDefense Labs. ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-3673 // JVNDB: JVNDB-2007-005845 // BID: 22351 // VULHUB: VHN-27035 // PACKETSTORM: 57669 // PACKETSTORM: 57695

AFFECTED PRODUCTS

vendor:symantecmodel:norton antispamscope:eqversion:2005

Trust: 2.4

vendor:symantecmodel:client securityscope:eqversion:3.1

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.0

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:2005

Trust: 1.9

vendor:symantecmodel:norton internet securityscope:eqversion:2005

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1000

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1.1000

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.0.338

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:2.0

Trust: 1.3

vendor:symantecmodel:norton personal firewallscope:eqversion:2005

Trust: 1.3

vendor:symantecmodel:norton personal firewallscope:eqversion:2006

Trust: 1.3

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 1.3

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.5.1100

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.3.1000

Trust: 1.0

vendor:symantecmodel:norton system worksscope:eqversion:2005

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.2.1000

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.2

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.4

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.5

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.1

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:2.0 to 3.1

Trust: 0.8

vendor:symantecmodel:norton antivirusscope:eqversion:corporate edition 9 to 10.1

Trust: 0.8

vendor:symantecmodel:norton internet securityscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton personal firewallscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:2005 and 2006

Trust: 0.8

vendor:symantecmodel:client securityscope:eqversion:3.1.6.6000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2010

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1008

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.0.338

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition mr4 buildscope:eqversion:9.0.41000

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.1.1007

Trust: 0.3

vendor:symantecmodel:client security mr6scope:neversion:3.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.394

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.0.359

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.394

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1001

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.5.1100

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:1.1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.6.600

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.400

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.6.6000

Trust: 0.3

vendor:symantecmodel:client security mr6 mp1 buildscope:eqversion:2.0.6-1100

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20050

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2001

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.400

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:2.0.4

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:1.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.401

Trust: 0.3

vendor:symantecmodel:client security mr4 mp1 buildscope:eqversion:3.1.4-4010

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.396

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition mr6scope:neversion:10.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.4.4010

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.3.1000

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:1.0.1

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:client security stm buildscope:eqversion:2.09.0.0.338

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2020

Trust: 0.3

vendor:symantecmodel:client security mr3 b9.0.3.1000scope:eqversion:2.0.3

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.2.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.1.1000

Trust: 0.3

vendor:symantecmodel:client security (scfscope:eqversion:2.07.1)

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.5

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition mr6 mp1 buildscope:neversion:9.0.6-1100

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.4

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.1.1008

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.396

Trust: 0.3

vendor:symantecmodel:client security buildscope:eqversion:2.0.51100

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2002

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:1.0

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.2

Trust: 0.3

vendor:symantecmodel:client security mr2 b9.0.2.1000scope:eqversion:2.0.2

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2011

Trust: 0.3

vendor:symantecmodel:client security mr1 b9.0.1.1000scope:eqversion:2.0.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2020

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.2.2021

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2010

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2001

Trust: 0.3

vendor:symantecmodel:norton antispamscope:eqversion:20050

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1007

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.1.1.1000

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.0.0.359

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2011

Trust: 0.3

vendor:symantecmodel:antivirus corporate editionscope:eqversion:9.0.4

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2021

Trust: 0.3

vendor:symantecmodel:client security mr6 mp1scope:neversion:2.0

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.401

Trust: 0.3

vendor:symantecmodel:antivirus corporate edition mr4 mp1 buildscope:eqversion:10.1.4-4010

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2002

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:eqversion:2.0.41000

Trust: 0.3

sources: BID: 22351 // JVNDB: JVNDB-2007-005845 // CNNVD: CNNVD-200707-277 // NVD: CVE-2007-3673

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3673
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3673
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-277
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27035
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3673
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27035
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27035 // JVNDB: JVNDB-2007-005845 // CNNVD: CNNVD-200707-277 // NVD: CVE-2007-3673

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3673

THREAT TYPE

local

Trust: 1.1

sources: BID: 22351 // PACKETSTORM: 57669 // PACKETSTORM: 57695 // CNNVD: CNNVD-200707-277

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200707-277

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005845

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-27035

PATCH

title:SYM07-018url:http://www.symantec.com/avcenter/security/Content/2007.07.11d.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-005845

EXTERNAL IDS

db:NVDid:CVE-2007-3673

Trust: 2.9

db:BIDid:22351

Trust: 2.0

db:SECUNIAid:26042

Trust: 1.8

db:VUPENid:ADV-2007-2507

Trust: 1.7

db:SECTRACKid:1018372

Trust: 1.7

db:OSVDBid:36117

Trust: 1.1

db:JVNDBid:JVNDB-2007-005845

Trust: 0.8

db:CNNVDid:CNNVD-200707-277

Trust: 0.7

db:IDEFENSEid:20070711 SYMANTEC ANTIVIRUS SYMTDI.SYS LOCAL PRIVILEGE ESCALATION VULNERABILITY

Trust: 0.6

db:XFid:35347

Trust: 0.6

db:PACKETSTORMid:57669

Trust: 0.2

db:EXPLOIT-DBid:4178

Trust: 0.1

db:VULHUBid:VHN-27035

Trust: 0.1

db:PACKETSTORMid:57695

Trust: 0.1

sources: VULHUB: VHN-27035 // BID: 22351 // JVNDB: JVNDB-2007-005845 // PACKETSTORM: 57669 // PACKETSTORM: 57695 // CNNVD: CNNVD-200707-277 // NVD: CVE-2007-3673

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554

Trust: 2.1

url:http://securityresponse.symantec.com/avcenter/security/content/2007.07.11d.html

Trust: 1.9

url:http://www.securityfocus.com/bid/22351

Trust: 1.7

url:http://securitytracker.com/id?1018372

Trust: 1.7

url:http://secunia.com/advisories/26042

Trust: 1.7

url:http://osvdb.org/36117

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2507

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35347

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3673

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3673

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2507

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35347

Trust: 0.6

url:http://www.symantec.com/avcenter/security/content/2007.07.11d.html

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/473392

Trust: 0.3

url:http://www.symantec.com/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3673

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://secunia.com/product/4009/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/product/6649/

Trust: 0.1

url:http://secunia.com/product/3478/

Trust: 0.1

url:http://secunia.com/product/14763/

Trust: 0.1

url:http://secunia.com/advisories/26042/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4847/

Trust: 0.1

url:http://secunia.com/product/4848/

Trust: 0.1

url:http://secunia.com/product/6637/

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6638/

Trust: 0.1

url:http://secunia.com/product/3549/

Trust: 0.1

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/5555/

Trust: 0.1

sources: VULHUB: VHN-27035 // BID: 22351 // JVNDB: JVNDB-2007-005845 // PACKETSTORM: 57669 // PACKETSTORM: 57695 // CNNVD: CNNVD-200707-277 // NVD: CVE-2007-3673

CREDITS

Zohiartze Herce

Trust: 0.6

sources: CNNVD: CNNVD-200707-277

SOURCES

db:VULHUBid:VHN-27035
db:BIDid:22351
db:JVNDBid:JVNDB-2007-005845
db:PACKETSTORMid:57669
db:PACKETSTORMid:57695
db:CNNVDid:CNNVD-200707-277
db:NVDid:CVE-2007-3673

LAST UPDATE DATE

2024-11-23T22:09:52.405000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27035date:2017-07-29T00:00:00
db:BIDid:22351date:2007-11-01T15:56:00
db:JVNDBid:JVNDB-2007-005845date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200707-277date:2007-07-18T00:00:00
db:NVDid:CVE-2007-3673date:2024-11-21T00:33:47.907

SOURCES RELEASE DATE

db:VULHUBid:VHN-27035date:2007-07-15T00:00:00
db:BIDid:22351date:2007-07-11T00:00:00
db:JVNDBid:JVNDB-2007-005845date:2012-12-20T00:00:00
db:PACKETSTORMid:57669date:2007-07-12T02:12:12
db:PACKETSTORMid:57695date:2007-07-13T00:55:11
db:CNNVDid:CNNVD-200707-277date:2007-07-15T00:00:00
db:NVDid:CVE-2007-3673date:2007-07-15T21:30:00