Denial of Service Vulnerability in Symantec Quarantine Server
1027
06 March 2020
28 July 2003
CLOSED
HIGH
SUMMARY
Symantec Central Quarantine Server (qserver.exe) consumes 100% of the CPU when a remote user connects to the user configurable TCP listener port and abnormally terminates the connection.
AFFECTED PRODUCTS
Components Affected
Norton AntiVirus Corporate Edition version 7.61
Symantec Anti Virus Corporate Edition version 8.01
Symantec Anti Virus Corporate Edition version 8.1
ISSUES
Description
A user with access to the internal corporate network can cause 100% CPU usage by the Symantec Central Quarantine Server. This occurs when a user connects to the Symantec Central Quarantine Server (qserver.exe) on the user configurable TCP listening port and abnormally terminated the connection prior to sending data. This can cause the Symantec Quarantine Server service to consume 100% CPU utilization on the affected server. To regain normal functionality, the Quarantine service must be restarted.
UPDATE - A second vulnerability has been discovered and fixed. The CPU usage of qserver.exe jumps to 100% when a user connects to the Symantec Central Quarantine Server port without sending any data. The CPU usage stays at this high level until the client terminates the connection.
Mitigating the risk - The risk from this vulnerability is greatly reduced if operating with a perimeter firewall that blocks telnet connections to the internal network as a part of normal security best practices. With this configuration, the vulnerable version of Symantec Central Quarantine Server is only accessible by an authorized user on the internal network and is not exploitable by outside sources.
MITIGATION
Symantec Response
Customers will need to download the appropriate version of Quarantine server and perform the following steps:
- Uninstall the existing version of Quarantine Server. Quarantine Console is not affected -- it is not necessary to uninstall Quarantine Console.
- Reboot
- Download and extract the appropriate version of Quarantine Server depending on your version of SAV:
- If you are using NAV 7.61, install Quarantine Server 2.6
- If you are using SAV 8.01, install Quarantine Server 3.11
- If you are using SAV 8.1, install Quarantine Server 3.2
- Run QSERVER\setup.exe to install the new version of Quarantine Server
- Reboot
- It will be necessary to re-configure Quarantine Server after reinstallation.
For reference, after installation the new file versions for qserver.exe will be:
- For QServer 2.6 -> 2.6.0.2
- For QServer 3.11 -> 3.1.0.9
- For QServer 3.2 -> 3.2.0.9
Note: Customers using Quarantine server shipped prior to 2.6 (shipped with NAV 7.5x, for example) are urged to upgrade to one of these new builds to address the issue.
ACKNOWLEDGEMENTS
The discovery and documentation of this vulnerability was conducted by the Qualys Security Research Team. Symantec Corporation would like to thank Qualys Security Research Team for identifying and working with us to resolve this issue.
For more information about the Qualys Security Research Team, visit their website at http://www.qualys.com or send email to [email protected]