ID

VAR-201012-0127


CVE

CVE-2010-3268


TITLE

Symantec Antivirus Corporate Edition Used in etc. Intel AMS of GetStringAMSHandler Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-003041

DESCRIPTION

The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request. Symantec Antivirus is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Symantec Antivirus Corporate Edition 10.1.4.4010 is vulnerable; other versions may also be affected. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://corelabs.coresecurity.com/ Symantec Intel Handler Service Remote DoS 1. *Advisory Information* Title: Symantec Intel Handler Service Remote DoS Advisory Id: CORE-2010-0728 Advisory URL: [http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos] Date published: 2010-12-13 Date of last update: 2010-12-13 Vendors contacted: Symantec Release mode: User release 2. *Vulnerability Information* Class: Input validation error [CWE-20] Impact: Denial of service Remotely Exploitable: Yes Locally Exploitable: No CVE Name: CVE-2010-3268 Bugtraq ID: N/A 3. A source address in a 'MOV' instruction is calculated from values present in the request, causing a remote denial-of-service. 4. *Vulnerable packages* . Older versions are probably affected too, but they were not checked. 5. *Non-vulnerable packages* 6. During the SEP 11.x engineering phase SEP was rewritten so that it no longer uses Intel AMS code. The installation of AMS is disabled by default for SEP versions that include it. The only workaround is to disable Intel AMS. 7. *Credits* This vulnerability was discovered and researched by Nahuel Riva from Core Security Technologies. Publication was coordinated by Jorge Lucangeli Obes. 8. *Technical Description / Proof of Concept Code* The request is handled in 'prgxhndl.dll', called from 'hndlsrvc.exe', more specifically from function '0x501A105D': /----- 501A105D /. 55 PUSH EBP 501A105E |. 8BEC MOV EBP,ESP 501A1060 |. 81EC 60040000 SUB ESP,460 501A1066 |. 8D45 F4 LEA EAX,DWORD PTR SS:[EBP-C] 501A1069 |. 57 PUSH EDI 501A106A |. 50 PUSH EAX 501A106B |. 68 34301A50 PUSH prgxhndl.501A3034 ; ASCII "CommandLine" 501A1070 |. FF75 0C PUSH DWORD PTR SS:[EBP+C] 501A1073 |. 8BF9 MOV EDI,ECX 501A1075 |. FF75 08 PUSH DWORD PTR SS:[EBP+8] 501A1078 |. E8 33010000 CALL <JMP.&HNDLRSVC.#17_?GetString@AMSHandler@@QAEHPAXKPADPAPAD@Z> - -----/ Inside that function, 'GetStringAMSHandler()' is called to parse the content of the 'CommandLine' field present in the request. In turn, 'GetStringAMSHandler()' forwards the request to function 'AMSLIB.18' present in 'AMSLIB.dll', and this function ends up calling the function that crashes, 'AMSGetPastParamList()', also in 'AMSLIB.dll': /----- 500733AE |. 8B45 E4 MOV EAX,DWORD PTR SS:[EBP-1C] 500733B1 |. 50 PUSH EAX ; /Arg1 500733B2 |. E8 54F3FFFF CALL AMSLIB.AMSGetPastParamList ; \AMSGetPastParamList - -----/ The crash occurs at address '0x5007278B': /----- 50072786 |. 8B45 F0 |MOV EAX,DWORD PTR SS:[EBP-10] 50072789 |. 33C9 |XOR ECX,ECX 5007278B |. 8A08 |MOV CL,BYTE PTR DS:[EAX] 5007278D |. 85C9 |TEST ECX,ECX 5007278F |. 75 16 |JNZ SHORT AMSLIB.500727A7 - -----/ When trying to read at the memory area pointed to by EAX, this value is invalid and the service crashes. This part of the code is parsing (inside a loop) the argument passed in the 'CommandLine' parameter. It seems that in many parts of the loop the pointer that is loaded from '[EBP-10]' is calculated from a value present in the request. 9. *Report Timeline* . 2010-08-12: Initial notification sent to Symantec. 2010-08-19: Given that there was no answer since the initial notification, Core requests a confirmation of reception. 2010-08-19: Vendor replies that the initial notification was not received. 2010-08-20: Core resends original advisory draft. 2010-08-20: Vendor acknowledges reception of advisory draft. 2010-08-25: Vendor replies that the issue looks like a duplicate of another one, already planned to be fixed in a September/October timeframe. Vendor will investigate further and give a definite reply. 2010-08-26: Core acknowledges this reply. 2010-08-26: Vendor confirms that the issue is a duplicate, but will give credit to Nahuel Riva as "secondary finder". Vendor asks to postpone the publication of the advisory until a fix is released. 2010-08-27: Core agrees to postpone the publication of the advisory, given that an estimate release date for the fix is provided. 2010-08-27: Vendor replies with an estimated release date for the end of September. 2010-08-27: Core agrees with the estimated release date, and requests the date of the initial report of the vulnerability. 2010-09-09: After two weeks with no replies, Core again requests the date of the initial report of the vulnerability, and asks if the release of the fix is still on track for the end of September. 2010-09-16: Vendor replies that they will not be able to release fixes before the end of the year, as they have to correct third-party code by themselves. 2010-09-21: Core requests confirmation that the vendor won't release a fix before the end of the year. 2010-09-22: Vendor confirms that they won't be able to release fixes until the end of the year, as fixing third-party code is taking time. However, the vendor explains that current versions of the product have the vulnerable functionality disabled, that old versions of the product do not install the vulnerable functionality by default, and that installation of this functionality is not recommended. 2010-10-05: Core requests version numbers for vulnerable and non-vulnerable versions of the software, and asks if vulnerable users can update to a non-vulnerable version. 2010-09-06: Vendor replies with the version numbers and confirms that vulnerable users have to wait for the patch. 2010-10-07: Core decides to push the release date forward and wait for the release of the patch. 2010-10-22: Core asks Symantec for a precise release date for the fixes, and explains that the publication of the advisory won't be pushed further than December 2010. 2010-10-23: Vendor replies that the last known date was during December, and that they will confirm a firmer date. 2010-11-01: Core asks Symantec if a firmer release date has been confirmed. 2010-11-03: Vendor replies that the engineering team has not confirmed a release date, and asks if Core can hold the publication of the advisory until the end of the year. 2010-11-25: Core replies that the December 13th release date is fixed, and requests an update on the status of the patches. 2010-12-13: No update received, advisory CORE-2010-0728 is published. 10. *References* 11. *About CoreLabs* CoreLabs, the research center of Core Security Technologies, is charged with anticipating the future needs and requirements for information security technologies. We conduct our research in several important areas of computer security including system vulnerabilities, cyber attack planning and simulation, source code auditing, and cryptography. Our results include problem formalization, identification of vulnerabilities, novel solutions and prototypes for new technologies. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use at: [http://corelabs.coresecurity.com]. 12. *About Core Security Technologies* Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at [http://www.coresecurity.com]. 13. *Disclaimer* The contents of this advisory are copyright (c) 2010 Core Security Technologies and (c) 2010 CoreLabs, and are licensed under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 (United States) License: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]. 14. *PGP/GPG Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at [http://www.coresecurity.com/files/attachments/core_security_advisories.asc]. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk0GR4UACgkQyNibggitWa1iKQCfYtzFZOnNGpclzNZEDrwM08wr gwsAn2UYlqC0+IpliLAVTn/ItK4Sc3ne =Up/o -----END PGP SIGNATURE----- . SOLUTION: Restrict access to trusted hosts only (e.g. via network access control lists). ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Symantec Products Intel Alert Management System Multiple Vulnerabilities SECUNIA ADVISORY ID: SA43099 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43099/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43099 RELEASE DATE: 2011-01-27 DISCUSS ADVISORY: http://secunia.com/advisories/43099/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43099/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43099 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Symantec products, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. 1) An error in the Intel AMS2 component when processing certain messages can be exploited to cause a buffer overflow via specially crafted packets sent to TCP port 38292. 2) An error in the Intel AMS2 component when processing certain messages can be exploited to run arbitrary commands via specially crafted packets sent to TCP port 38292. 3) An error in the Intel AMS2 component when processing certain messages can be exploited to create arbitrary events (e.g. launch a program or send an email) via specially crafted messages sent to TCP port 38292. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. * Symantec System Center 10.x SOLUTION: Update to version 10.1 MR10. * An anonymous researcher via ZDI. * Jorge Lucangeli Obes, CORE Security. ORIGINAL ADVISORY: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20110126_00 http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20110126_01 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.25

sources: NVD: CVE-2010-3268 // JVNDB: JVNDB-2010-003041 // BID: 45368 // VULHUB: VHN-45873 // PACKETSTORM: 96673 // PACKETSTORM: 96852 // PACKETSTORM: 97932

AFFECTED PRODUCTS

vendor:intelmodel:alert management systemscope: - version: -

Trust: 1.4

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0.3001

Trust: 1.0

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0.4

Trust: 1.0

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0.1

Trust: 1.0

vendor:symantecmodel:antivirusscope:eqversion:10.1.4.4010

Trust: 1.0

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0.2

Trust: 1.0

vendor:symantecmodel:endpoint protectionscope:eqversion:11.0

Trust: 1.0

vendor:intelmodel:alert management systemscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:antivirusscope:eqversion:windows 2000 sp4 edition corporate edition 10.1.4.4010

Trust: 0.8

vendor:symantecmodel:endpoint protectionscope:ltversion:11.x

Trust: 0.8

vendor:symantecmodel:antivirus corporate editionscope:eqversion:10.1.4.4010

Trust: 0.3

sources: BID: 45368 // JVNDB: JVNDB-2010-003041 // CNNVD: CNNVD-201012-180 // NVD: CVE-2010-3268

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-3268
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-3268
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201012-180
value: MEDIUM

Trust: 0.6

VULHUB: VHN-45873
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-3268
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-45873
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-45873 // JVNDB: JVNDB-2010-003041 // CNNVD: CNNVD-201012-180 // NVD: CVE-2010-3268

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-45873 // JVNDB: JVNDB-2010-003041 // NVD: CVE-2010-3268

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 96673 // CNNVD: CNNVD-201012-180

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201012-180

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003041

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-45873

PATCH

title:Top Pageurl:http://www.intel.com/

Trust: 0.8

title:symantec securityupdates sid 20110126_00url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00

Trust: 0.8

sources: JVNDB: JVNDB-2010-003041

EXTERNAL IDS

db:NVDid:CVE-2010-3268

Trust: 2.9

db:SECUNIAid:42593

Trust: 1.2

db:SECUNIAid:43099

Trust: 1.2

db:BIDid:45936

Trust: 1.1

db:VUPENid:ADV-2010-3206

Trust: 1.1

db:VUPENid:ADV-2011-0234

Trust: 1.1

db:SECTRACKid:1024866

Trust: 1.1

db:JVNDBid:JVNDB-2010-003041

Trust: 0.8

db:CNNVDid:CNNVD-201012-180

Trust: 0.7

db:BIDid:45368

Trust: 0.4

db:PACKETSTORMid:96673

Trust: 0.2

db:VULHUBid:VHN-45873

Trust: 0.1

db:PACKETSTORMid:96852

Trust: 0.1

db:PACKETSTORMid:97932

Trust: 0.1

sources: VULHUB: VHN-45873 // BID: 45368 // JVNDB: JVNDB-2010-003041 // PACKETSTORM: 96673 // PACKETSTORM: 96852 // PACKETSTORM: 97932 // CNNVD: CNNVD-201012-180 // NVD: CVE-2010-3268

REFERENCES

url:http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos

Trust: 1.2

url:http://www.securityfocus.com/bid/45936

Trust: 1.1

url:http://www.securityfocus.com/archive/1/515191/100/0/threaded

Trust: 1.1

url:http://www.securitytracker.com/id?1024866

Trust: 1.1

url:http://secunia.com/advisories/42593

Trust: 1.1

url:http://secunia.com/advisories/43099

Trust: 1.1

url:http://www.vupen.com/english/advisories/2010/3206

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0234

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/64028

Trust: 1.1

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110126_00

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3268

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-3268

Trust: 0.8

url:http://www.coresecurity.com/content/symantec-intel-handler-service-remote-dos]

Trust: 0.4

url:http://www.symantec.com

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/products/corporate/vim/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2011&amp;suid=20110126_00

Trust: 0.1

url:http://corelabs.coresecurity.com].

Trust: 0.1

url:http://www.coresecurity.com/files/attachments/core_security_advisories.asc].

Trust: 0.1

url:http://enigmail.mozdev.org/

Trust: 0.1

url:http://corelabs.coresecurity.com/

Trust: 0.1

url:http://www.coresecurity.com].

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3268

Trust: 0.1

url:http://creativecommons.org/licenses/by-nc-sa/3.0/us/].

Trust: 0.1

url:http://secunia.com/advisories/42593/

Trust: 0.1

url:http://secunia.com/advisories/42593/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42593

Trust: 0.1

url:http://secunia.com/advisories/43099/

Trust: 0.1

url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20110126_01

Trust: 0.1

url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20110126_00

Trust: 0.1

url:http://secunia.com/advisories/43099/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43099

Trust: 0.1

sources: VULHUB: VHN-45873 // BID: 45368 // JVNDB: JVNDB-2010-003041 // PACKETSTORM: 96673 // PACKETSTORM: 96852 // PACKETSTORM: 97932 // NVD: CVE-2010-3268

CREDITS

Nahuel Riva from Core Security Technologies

Trust: 0.3

sources: BID: 45368

SOURCES

db:VULHUBid:VHN-45873
db:BIDid:45368
db:JVNDBid:JVNDB-2010-003041
db:PACKETSTORMid:96673
db:PACKETSTORMid:96852
db:PACKETSTORMid:97932
db:CNNVDid:CNNVD-201012-180
db:NVDid:CVE-2010-3268

LAST UPDATE DATE

2024-11-23T20:25:16.254000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-45873date:2018-10-30T00:00:00
db:BIDid:45368date:2010-12-13T00:00:00
db:JVNDBid:JVNDB-2010-003041date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201012-180date:2010-12-23T00:00:00
db:NVDid:CVE-2010-3268date:2024-11-21T01:18:24.163

SOURCES RELEASE DATE

db:VULHUBid:VHN-45873date:2010-12-22T00:00:00
db:BIDid:45368date:2010-12-13T00:00:00
db:JVNDBid:JVNDB-2010-003041date:2012-03-27T00:00:00
db:PACKETSTORMid:96673date:2010-12-13T13:19:27
db:PACKETSTORMid:96852date:2010-12-21T09:42:08
db:PACKETSTORMid:97932date:2011-01-27T05:49:51
db:CNNVDid:CNNVD-201012-180date:2010-12-20T00:00:00
db:NVDid:CVE-2010-3268date:2010-12-22T21:00:15.723