Symantec AppStream ActiveX Unauthorized Access

1168

06 March 2020

15 January 2009

CLOSED

HIGH

9.3

SUMMARY

 

Vulnerabilities were reported in an ActiveX control that Symantec’s AppStream 5.2.x Client installs. Exploitation of this issue could possibly lead to unauthorized information disclosure, system information corruption or potentially allow arbitrary code execution in the context of the user’s browser. Successful exploitation would require user interaction.

AFFECTED PRODUCTS

 

Product

Version

Platform

Solution

Symantec AppStream Client

5.2.x

All

5.2.2 SP3 MP1

ISSUES

 

Severity

High

Remote Access (adjacent network)

Yes

Local Access

No

Authentication Required

No

Exploit available

No

MITIGATION

 

Details

Symantec engineers discovered a vulnerable ActiveX control, LaunchObj, in Symantec’s AppStream 5.2.x client during an internal review. CERT also discovered this vulnerable control and reported their findings to Symantec. 

Although this control was not intended to be called by an unauthorized server, it failed to properly validate external input. If called by a malicious user able to successfully masquerade as a valid server, this lack of proper validation could potentially allow download of arbitrary code on a client system. This could result in a browser crash or allow unauthorized access to add, modify, overwrite or corrupt existing files on the targeted system. Unauthorized access to the vulnerable control could result in possible arbitrary code execution in the context of the client. An attacker would have to effectively entice a user to download and execute code via a malicious web site that could effectively call this vulnerable control.

Symantec Response

Symantec product engineers have developed and released solutions for this issue through Symantec's support download locations as indicated. 

Symantec recommends all customers apply the latest available updates to protect against threats of this nature. 

Symantec knows of no exploitation of or adverse customer impact from these issues. 

The update listed for affected products is available from the following location: 

http://www.symantec.com/business/software-virtualization-solution-professional

Best Practices

As part of normal best practices, Symantec strongly recommends:

  • Restrict access to administration or management systems to privileged users.
  • Restrict remote access, if it is required, to trusted/authorized systems only.
  • Run under the principle of least privilege where possible to limit the impact of potential exploits.
  • Keep all operating systems and applications updated with the latest vendor patches.
  • Follow a multi-layered approach to security. Run both firewall and antivirus applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats.
  • Keep all operating systems and applications updated with the latest vendor patches.
  • Users should be cautious of mysterious attachments and executables delivered via email and be cautious of browsing unknown/untrusted websites or opening unknown/untrusted URL links.

ACKNOWLEDGEMENTS

 

Symantec thanks Will Dormann at CERT for reporting this finding and coordinating closely with Symantec as we resolved the issue.

REFERENCES

 

Security Focus, http://www.securityfocus.com, has assigned a Bugtraq ID (BID) 33247 to this issue for inclusion in the Security Focus vulnerability database. 

This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org).
The CVE initiative has assigned CVE-2008-4388 to this issue.