Symantec LiveUpdate up to 2.7 build 38 Local Password missing encryption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Symantec LiveUpdate up to 2.7 build 38. It has been classified as problematic. Affected by this vulnerability is an unknown functionality of the component Local Password Handler. The manipulation leads to missing encryption. This vulnerability is uniquely identified as CVE-2005-2766. The attack can only be initiated within the local network. No exploit exists. Upgrading the affected component is recommended.
Details
A vulnerability was found in Symantec LiveUpdate up to 2.7 build 38. It has been rated as critical. This issue affects an unknown code block of the component Local Password Handler. The manipulation with an unknown input leads to a missing encryption vulnerability. Using CWE to declare the problem leads to CWE-311. The product does not encrypt sensitive or critical information before storage or transmission. Impacted is confidentiality, and integrity. The summary by CVE is:
Symantec AntiVirus Corporate Edition 9.0.1.x and 9.0.4.x, and possibly other versions, when obtaining updates from an internal LiveUpdate server, stores sensitive information in cleartext in the Log.Liveupdate log file, which allows attackers to obtain the username and password to the internal LiveUpdate server.
The weakness was disclosed 09/05/2005 by Arthur Freyman (Website). It is possible to read the advisory at securityresponse.symantec.com. The identification of this vulnerability is CVE-2005-2766 since 09/02/2005. Access to the local network is required for this attack. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available. The attack technique deployed by this issue is T1600 according to MITRE ATT&CK.
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at symantec.com. The best possible mitigation is suggested to be upgrading to the latest version.
The vulnerability is also documented in the databases at X-Force (22106), SecurityFocus (BID 14708†), OSVDB (19221†), Secunia (SA16653†) and SecurityTracker (ID 1014834†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.symantec.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.1VulDB Meta Temp Score: 6.8
VulDB Base Score: 7.1
VulDB Temp Score: 6.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Missing encryptionCWE: CWE-311 / CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Patch: symantec.com
Timeline
08/31/2005 🔍08/31/2005 🔍
09/02/2005 🔍
09/02/2005 🔍
09/05/2005 🔍
09/05/2005 🔍
09/06/2005 🔍
10/31/2012 🔍
03/12/2021 🔍
Sources
Vendor: symantec.comAdvisory: securityresponse.symantec.com
Researcher: Arthur Freyman
Status: Confirmed
CVE: CVE-2005-2766 (🔍)
GCVE (CVE): GCVE-0-2005-2766
GCVE (VulDB): GCVE-100-1727
X-Force: 22106
SecurityFocus: 14708
Secunia: 16653 - Symantec Anti-Virus LiveUpdate Credentials Disclosure, Less Critical
OSVDB: 19221 - Symantec Anti-Virus LiveUpdate Log File Local Credential Disclosure
SecurityTracker: 1014834 - Symantec Anti Virus Internal LiveUpdate Feature Discloses Passwords to Local Users
Vulnerability Center: 36895 - Symantec AntiVirus Corporate Edition Internal LiveUpdate Server Username and Password Disclosure, Low
Entry
Created: 09/06/2005 11:07Updated: 03/12/2021 06:45
Changes: 09/06/2005 11:07 (52), 06/07/2017 16:01 (21), 03/12/2021 06:45 (4)
Complete: 🔍
Cache ID: 216:E50:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.