Buffer overflow in the sysplant driver in Symantec Endpoint Protection (SEP) Client 11.x and 12.x before 12.1 RU4 MP1b, and Small Business Edition before SEP 12.1, allows local users to execute arbitrary code via a long argument to a 0x00222084 IOCTL call.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140804_00 | vendor advisory |
http://www.osvdb.org/109663 | vdb entry |
http://www.securityfocus.com/bid/68946 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95062 | vdb entry |
http://www.kb.cert.org/vuls/id/252068 | third party advisory us government resource |
http://secunia.com/advisories/58996 | third party advisory |
http://secunia.com/advisories/59697 | third party advisory |
http://www.exploit-db.com/exploits/34272 | exploit |
http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html |