<<< Date Index >>>     <<< Thread Index >>>

Re: Secure Network Operations SNOsoft Research Team [SRT2004-12-14-0322] Symantec LiveUpdate Advisory



In-Reply-To: <20041213213212.23F5F4F563@xxxxxxxxxxxxxxxxxxx>


<full-disclosure@xxxxxxxxxxxxxxxx>
>Subject: Secure Network Operations SNOsoft Research Team [SRT2004-12-14-0322] 
>Symantec LiveUpdate Advisory
>Date: Mon, 13 Dec 2004 16:28:34 -0500
>Organization: Secure Network Operations, Inc.
--------------snip---------------
>
>Quick Summary:
>**********************************************************************
>********
>Advisory Number         : SRT2004-12-14-0322
>
>Product                 : Symantec LiveUpdate
>
>Version                 : Prior to version 2.5
>
>Vendor                  :
>http://symantec.com/techsupp/files/lu/lu.html
>
>Class                   : Local
>
>Criticality             : High (to users of the below listed
>products)
>
>Products Affected      : Symantec Windows LiveUpdate prior to v2.5
>                       : Symantec Norton SystemWorks 2001-2005
>                       : Symantec Norton AntiVirus 2001-2005
>                       : Symantec Norton AntiVirus Pro 2001-2004
>                       : Symantec Norton Internet Security 2001-2005
>                       : Norton Internet Security Pro 2001-2004
>                       : Symantec Norton AntiSpam 2005
>                       : Symantec AntiVirus for Handhelds Retail and 
>                         Corporate Edition v3.0 Not Affected
>                       : Symantec Windows LiveUpdate v2.5 and later
>                       : Symantec Java LiveUpdate (all versions)
>                       : Symantec Enterprise products (Symantec Enterprise 
>                          products do not support the Automatic
>LiveUpdate
>                          functionality with the exception of
>Symantec 
>                          AntiVirus for Handhelds Corporate Edition
>v3.0)
>
>
>Operating System(s):  
>**********************************************************************
>********
>       - Win32
>
>
>Notice:
>**********************************************************************
>********
>The full technical details of this vulnerability can be found at:
>http://www.secnetops.com under the research section. 
>
>
>Basic Explanation:
>**********************************************************************
>********
>High Level Description  : LiveUpdate allows local users to become
>SYSTEM
>What to do              : run LiveUpdate and apply latest patches. 
>
>
>Proof Of Concept Status:  
>**********************************************************************
>********
>Functional, Contact SNO for details. 
>
>
>Short Description:
>**********************************************************************
>----------------snip----------------------

----------------------------snip-----------------

Note:  Minor discrepancy in the SecNetOps advisory as posted.
Symantec 2005 products are not vulnerable to this issue as all shipped with 
Symantec LiveUpdate v2.5

Symantec Security Response Advisory  

SYM04-018

13 December 2004

Symantec Windows LiveUpdate Configuration Options Elevation of Privilege 

Revision History
None

Risk Impact
Medium

Local access required.  Automatic LiveUpdate launches as a scheduled task if so 
configured and only on systems running retail versions of Symantec products as 
well as on handheld systems running Symantec AntiVirus for Handhelds Corporate 
Edition v3.0.  Impact of this issue would result in elevated privilege on the 
host system only and is highly dependent on system configuration and 
environment.

Overview
Security analysts from Secure Network Operations, http://www.secnetops.com/ 
notified Symantec of a potential issue with the NetDetect task that runs as a 
scheduled task as a part of Automatic LiveUpdate.  If the system is configured 
as a multi-user system with privileged and non-privileged user access, a 
non-privileged user could potentially access and manipulate the Symantec 
Windows LiveUpdate GUI functionality to gain privileged system access.

Affected Components
Symantec Windows LiveUpdate prior to v2.5
Symantec Norton SystemWorks 2001-2004
Symantec Norton AntiVirus and Pro 2001-2004
Symantec Norton Internet Security and Pro 2001-2004
Symantec AntiVirus for Handhelds Retail and Corporate Edition v3.0 

Not Affected
Symantec Windows LiveUpdate v2.5 
Symantec Java LiveUpdate (all versions)
Symantec Enterprise products (Symantec Enterprise products do not support the 
Automatic LiveUpdate functionality with the exception of Symantec AntiVirus for 
Handhelds Corporate Edition v3.0)

Details
Symantec Automatic LiveUpdate, a functionality included with many Symantec 
retail products as well as on Symantec AntiVirus for Handhelds Corp v3.0, is 
launched by the system scheduler on system startup and then periodically after 
startup.  Symantec Automatic LiveUpdate checks for available updates to any 
supported Symantec products installed on the system using a scheduled task call 
NetDetect.  

When a vulnerable version of Symantec Automatic LiveUpdate was initially 
launched at startup it was being assigned Local System privileges.  During the 
period when an interactive LiveUpdate session was available, and only during 
this session, a non-privileged user could potentially manipulate portions of 
the LiveUpdate GUI Internet options configuration functionality to gain 
elevated privilege on the local host.  For example, the non-privileged user 
could gain privileges to search all system files, assume full permission for 
directories and files on the host, or add themselves to the local 
administrative group. 

Symantec Response

Symantec engineers had already identified this issue in supported versions of 
Symantec Windows LiveUpdate and were in the process of addressing it when 
Secure Network Operations analysts contacted us with their verification of the 
issue.  Symantec addressed this issue in Symantec Windows LiveUpdate v2.5, 
which if customers have been keeping their systems updated should have already 
been installed on affected Symantec products. The latest version of Symantec 
Windows LiveUpdate is also available for download from the Symantec technical 
support site at http://www.symantec.com/techsupp/files/lu/lu.html.

Determining your version of Symantec LiveUpdate:

1. Open any Symantec retail product installed on your system, e.g., Symantec 
Norton AntiVirus 2004
2. Click on LiveUpdate in the toolbar
3. Click on the LiveUpdate system menu to see the drop-down selections



4. Click on "About LiveUpdate" to see the version of LiveUpdate you are running

If you are running a version of Symantec Windows LiveUpdate earlier than 
version 2.5, you should either run LiveUpdate to get the latest updates for 
products on your system, or download the latest release of Symantec Windows 
LiveUpdate from the location provided above.

Mitigating Circumstances

While effectively exploiting this issue would permit a non-privileged user to 
gain privileged access on the local host, there are mitigating circumstances 
that greatly reduce the risk of exploitation in Symantec's Automatic 
LiveUpdate:  

* Symantec Automatic LiveUpdate is only implemented in retail versions of 
Symantec products with the exception of Symantec AntiVirus for Handhelds 
Corporate Edition v3.0, which uses Symantec Automatic LiveUpdate to check for 
essential updates when connected to the network. 
* The system is vulnerable only if the interactive LiveUpdate capability is 
implemented on the system
o Automatic LiveUpdate must be configured with the option enabled to notify the 
user when updates are available
o If the system is a single-user system, this would not be an issue
o If the system IS configured as a multi-user system with privileged and 
non-privileged user access to the host system, the non-privileged user would 
require an authorized user account on the host system and must be logged on 
interactively to exploit this issue
* Elevated privileges can be gained only on the local system, which normally 
limits any impact

CVE
CVE candidate numbers will be requested from The Common Vulnerabilities and 
Exposures (CVE) initiative. This advisory will be revised as required once CVE 
candidate numbers have been assigned. Issues are candidates for inclusion in 
the CVE list (http://cve.mitre.org), which standardizes names for security 
problems. 

Credit
Symantec appreciates the work of the Secure Network Operations security team in 
notifying Symantec of their findings and close coordination with Symantec to 
properly update and protect Symantec customers.  Information on this and other 
security issues can be found at their Secure Network Operations, Inc. web site, 
http://www.secnetops.com/


Symantec takes the security and proper functionality of its products very 
seriously. As founding members of the Organization for Internet Safety 
(OISafety), Symantec follows the principles of responsible disclosure. Symantec 
also subscribes to the vulnerability guidelines outlined by the National 
Infrastructure Advisory Council (NIAC). Please contact secure@xxxxxxxxxxxx if 
you feel you have discovered a potential or actual security issue with a 
Symantec product. A Symantec Product Security team member will contact you 
regarding your submission.
Symantec has developed a Product Vulnerability Handling Process document 
outlining the process we follow in addressing suspected vulnerabilities in our 
products. We support responsible disclosure of all vulnerability information in 
a timely manner to protect Symantec customers and the security of the Internet 
as a result of vulnerability. This document is available from the location 
provided below.
Symantec strongly recommends using encrypted email for reporting vulnerability 
information to secure@xxxxxxxxxxxxx The Symantec Product Security PGP key can 
be obtained from the location provided below.
Symantec Vulnerability Response Policy, http://www.symantec.com/security 
Symantec Product Vulnerability Response PGP Key, 
http://www.symantec.com/security 

Copyright (c) 2004 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as it 
is not edited in any way unless authorized by Symantec Security Response. 
Reprinting the whole or parts of this alert in any medium other than 
electronically requires permission from secure@xxxxxxxxxxxxx
Disclaimer
The information in the advisory is believed to be accurate at the time of 
publishing based on currently available information. Use of the information 
constitutes acceptance for use in an AS IS condition. There are no warranties 
with regard to this information. Neither the author nor the publisher accepts 
any liability for any direct, indirect, or consequential loss or damage arising 
from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response are registered 
trademarks of Symantec Corp. and/or affiliated companies in the United States 
and other countries. All other registered and unregistered trademarks 
represented in this document are the sole property of their respective 
companies/owners.