Vulnerabilities > CVE-2008-1754 - Cryptographic Issues vulnerability in Symantec Altiris Deployment Solution 6.8/6.8.380
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Symantec Altiris Deployment Solution before 6.9.164 stores the Deployment Solution Agent (aka AClient) password in cleartext in memory, which allows local users to obtain sensitive information by dumping the AClient.exe process memory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | Windows |
NASL id | ALTIRIS_6_9_164.NASL |
description | The version of the Altiris Client Agent (aclient) installed on the remote host reportedly is susceptible to a shatter attack that could allow a local user to elevate his or her privileges on the affected system. In addition, the Altiris Deployment Solution reportedly stores the AClient password in system memory. By dumping system memory for AClient.exe, a local user could potentially recover the password and use that to gain access to the local agent admin interface, which in turn could allow for code execution with system level privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 31417 |
published | 2008-03-12 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/31417 |
title | Altiris AClient < 6.9.164 Multiple Local Vulnerabilities |
code |
|
References
- http://secunia.com/advisories/29771
- http://secunia.com/advisories/29771
- http://securityresponse.symantec.com/avcenter/security/Content/2008.04.10.html
- http://securityresponse.symantec.com/avcenter/security/Content/2008.04.10.html
- http://www.osvdb.org/44388
- http://www.osvdb.org/44388
- http://www.securityfocus.com/bid/28707
- http://www.securityfocus.com/bid/28707
- http://www.securitytracker.com/id?1019825
- http://www.securitytracker.com/id?1019825
- http://www.vupen.com/english/advisories/2008/1197/references
- http://www.vupen.com/english/advisories/2008/1197/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41771
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41771