Vulnerabilities > CVE-2012-0305 - Unspecified vulnerability in Symantec Backupexec System Recovery and System Recovery

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
symantec
nessus

Summary

Untrusted search path vulnerability in Symantec System Recovery 2011 before SP2 and Backup Exec System Recovery 2010 before SP5 allows local users to gain privileges via a Trojan horse DLL in the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426: Untrusted Search Path'

Nessus

NASL familyWindows
NASL idSYMANTEC_SYSTEM_RECOVERY_DLL_LOADING.NASL
descriptionThe remote Windows host contains a version of Symantec System Recovery 2011 earlier than Service Pack 2. As such, it is reportedly affected by an insecure library loading vulnerability. If an attacker can trick a user on the affected system into opening a specially crafted file in the Granular Restore Option directory or the Recovery Point Browser directory, this issue could be leveraged to execute arbitrary code subject to the user
last seen2020-06-01
modified2020-06-02
plugin id60161
published2012-07-31
reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/60161
titleSymantec System Recovery 2011 imapi.dll Path Subversion Arbitrary DLL Injection Code Execution (SYM12-012)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(60161);
  script_version("1.10");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2012-0305");
  script_bugtraq_id(54594);
  script_xref(name:"IAVA", value:"2012-A-0125");

  script_name(english:"Symantec System Recovery 2011 imapi.dll Path Subversion Arbitrary DLL Injection Code Execution (SYM12-012)");
  script_summary(english:"Checks version of Symantec System Recovery");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by a
code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Windows host contains a version of Symantec System
Recovery 2011 earlier than Service Pack 2.  As such, it is reportedly
affected by an insecure library loading vulnerability.  If an attacker
can trick a user on the affected system into opening a specially
crafted file in the Granular Restore Option directory or the Recovery
Point Browser directory, this issue could be leveraged to execute
arbitrary code subject to the user's privileges.");
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?8c32a74e");
  script_set_attribute(attribute:"solution", value:"Upgrade to Symantec System Recovery 2011 SP2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/07/20");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/07/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/07/31");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:backupexec_system_recovery");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc.");
  
  script_dependencies("symantec_backup_exec_server_installed.nasl");
  script_require_keys("SMB/Symantec System Recovery/Installed");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("audit.inc");

get_kb_item_or_exit('SMB/Symantec System Recovery/Installed');

installs = get_kb_list('SMB/Symantec System Recovery/Installs/*');
if (isnull(installs)) exit(1, 'The \'SMB/Symantec System Recovery/Installs KB list is missing.');

info = '';
info2 = '';
foreach install (keys(installs))
{
  path = installs[install];
  version = install - 'SMB/Symantec System Recovery/Installs/';

  if (version =~ '^10\\.' && ver_compare(ver:version, fix:'10.0.2.44074') == -1)
  {
    vuln++;
    info +=
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 10.0.2.44074\n';
  }
  else info2 += ' and ' + version;
}

if (info)
{
  if (report_verbosity > 0) security_warning(port:get_kb_item('SMB/transport'), extra:info);
  else security_warning(get_kb_item('SMB/transport'));
  exit(0);
}

if (info2)
{
  info2 -= ' and ';
  if (' and ' >< info2) be = 'are';
  else be = 'is';

  exit(0, 'The host is not affected since Symantec System Recovery ' + info2 + ' ' + be + ' installed.');
}
else exit(1, 'Unexpected error - \'info2\' is empty.');