TITLE:
Symantec Scan Engine Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA19734

VERIFY ADVISORY:
http://secunia.com/advisories/19734/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass, Exposure of sensitive information

WHERE:
>From local network

SOFTWARE:
Symantec Scan Engine 5.x
http://secunia.com/product/6651/

DESCRIPTION:
Three vulnerabilities has been reported in Symantec Scan Engine,
which can be exploited by malicious people to disclose potentially
sensitive information, bypass authentication and conduct
man-in-the-middle (MITM) attacks.

1) A design error in the authentication mechanism used by Symantec
Scan Engine can be exploited to gain  access to the web-based
administrative interface via specially-crafted XML requests sent to
the server using its proprietary protocol.

2) Symantec Scan Engine uses a static private DSA key for SSL
communications between the server and the administrative control
application. This key cannot be changed and can potentially be
exploited in a man-in-the-middle attack to decrypt all communications
between the Scan Engine and an administrative client.

3) Symantec Scan Engine does not properly restrict access to files
within the installation directory. This can be exploited by
unauthenticated users to download any file located under the
directory, such as the configuration file, the scanning logs, and the
current virus definitions via HTTP requests.

The vulnerabilities have been reported in version 5.0.

SOLUTION:
Update to version 5.1.

PROVIDED AND/OR DISCOVERED BY:
1,2) Marc Bevand of Rapid7
3) Joe Testa of Rapid7

ORIGINAL ADVISORY:
Symantec:
http://securityresponse.symantec.com/avcenter/security/Content/2006.04.21.html

Rapid7:
http://www.rapid7.com/advisories/R7-0021.html
http://www.rapid7.com/advisories/R7-0022.html
http://www.rapid7.com/advisories/R7-0023.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------