Vulnerability Name:

CVE-2009-1431 (CCN-50179)

Assigned:2009-04-28
Published:2009-04-28
Updated:2019-09-20
Summary:XFR.EXE in the Intel File Transfer service in the console in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary code by placing the code on a (1) share or (2) WebDAV server, and then sending the UNC share pathname to this service.
Per vendor: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02

"Symantec System Center Impact

Symantec System Center (SSS) is a Microsoft Management Console (MMC) plug-in which allows an administrator to manage all Symantec AntiVirus platforms from a single, centralized location. Alert Management System 2 (AMS2) is an alerting feature of System Center that listens for specific events and sends notifications as specified by the administrator.

AMS2 is installed by default with Symantec System Center 9.0. AMS2 is an optional component in Symantec System Center 10.0 or 10.1. These vulnerabilities will only impact systems if AMS has been installed.

Symantec AntiVirus Server Impact

AMS2 is installed by default with Symantec AntiVirus Server 9.0. AMS2 is an optional component in Symantec AntiVirus Server 10.0 or 10.1. These vulnerabilities will only impact systems if AMS has been installed.

Symantec AntiVirus and Symantec Endpoint Protection Central Quarantine Server Impact

AMS2 is installed by default by Central Quarantine Server. These vulnerabilities will only impact systems if Quarantine Server has been installed.

Symantec is not aware of any customers impacted by these issues, or of any attempts to exploit them. However, we recommend that any affected customers update their product immediately to protect against potential attempts to exploit these issues.

Certain localized language versions of SCS 2.0/SAV 9.x were not patched due to compatibility issues on the localized platforms. As a result, customers who are running the following versions are strongly recommended to update to a non-vulnerable SCS 2.0/SAV 9 International English version or upgrade to a non-vulnerable version of SEP 11.x:

Symantec Client Security 2.0/Symantec AntiVirus Corporate Edition 9.x (Chinese Simplified and Chinese Traditional)
Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Chinese Simplified and Chinese Traditional)
Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Korean)
Symantec Client Security 2.0/Symantec AntiVirus Business Pack 9.x (Japanese licensed)"
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-1431

Source: IDEFENSE
Type: Third Party Advisory
20090429 Symantec System Center Alert Management System Console Arbitrary Program Execution Design Error Vulnerability

Source: CCN
Type: SA34856
Symantec Products Alert Management System 2 Multiple Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
34856

Source: CCN
Type: SECTRACK ID: 1022130
Symantec Anti Virus Corporate Edition Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code

Source: CCN
Type: SECTRACK ID: 1022131
Symantec Client Security Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code

Source: CCN
Type: SECTRACK ID: 1022132
Symantec Endpoint Protection Bugs in Alert Management System 2 Let Remote Users Execute Arbitrary Code

Source: CCN
Type: OSVDB ID: 54160
Symantec Multiple Products Alert Management System Console Intel File Transfer Service (XFR.EXE) Arbitrary Code Execution

Source: BID
Type: Third Party Advisory, VDB Entry
34675

Source: CCN
Type: BID-34675
Multiple Symantec Products Alert Management System Console Arbitrary Code Execution Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1022130

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1022131

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1022132

Source: CCN
Type: SYM09-007
Symantec Alert Management System 2 multiple vulnerabilities

Source: CONFIRM
Type: Vendor Advisory
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02

Source: VUPEN
Type: Third Party Advisory
ADV-2009-1204

Source: XF
Type: Third Party Advisory, VDB Entry
symantec-xfr-code-execution(50179)

Source: XF
Type: UNKNOWN
symantec-xfr-code-execution(50179)

Source: CCN
Type: iDefense PUBLIC ADVISORY: 04.29.09
Symantec System Center Alert Management System Console Arbitrary Program Execution Design Error Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:symantec:antivirus:-:-:srv:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:*:-:corporate:*:*:*:*:* (Version <= 9.0)
  • OR cpe:/a:symantec:antivirus:*:*:corporate:*:*:*:*:* (Version >= 10 and <= 10.2)
  • OR cpe:/a:symantec:antivirus_central_quarantine_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:*:*:*:*:*:*:*:* (Version <= 2.0)
  • OR cpe:/a:symantec:client_security:*:*:*:*:*:*:*:* (Version >= 3.0 and <= 3.1)
  • OR cpe:/a:symantec:endpoint_protection:*:*:*:*:*:*:*:* (Version <= 11.0)
  • OR cpe:/a:symantec:system_center:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:symantec:client_security:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.0::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.1::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.0.1::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.0.2::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.0.4::corporate:*:*:*:*:*
  • OR cpe:/a:symantec:endpoint_protection:11.0.6200.754:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:antivirus:10.2::corporate:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    symantec antivirus - -
    symantec antivirus * -
    symantec antivirus *
    symantec antivirus central quarantine server *
    symantec client security *
    symantec client security *
    symantec endpoint protection *
    symantec system center *
    symantec client security 3.1
    symantec client security 3.1.0.396
    symantec client security 3.1.0.401
    symantec antivirus 10.0
    symantec antivirus 10.1
    symantec antivirus 10.0.1
    symantec antivirus 10.0.2
    symantec antivirus 10.0.4
    symantec endpoint protection 11.0.6200.754
    symantec antivirus 10.2