Vulnerabilities > CVE-2014-9227 - DLL Loading Local Privilege Escalation vulnerability in Symantec Endpoint Protection Manager and Client

047910
CVSS 4.4 - MEDIUM
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
symantec
nessus

Summary

Multiple untrusted search path vulnerabilities in the Manager component in Symantec Endpoint Protection (SEP) before 12.1.6 allow local users to gain privileges via a Trojan horse DLL in an unspecified directory. <a href="http://cwe.mitre.org/data/definitions/426.html">CWE-426: Untrusted Search Path</a>

Nessus

NASL familyWindows
NASL idSYMANTEC_ENDPOINT_PROT_MGR_SYM15-005.NASL
descriptionThe version of Symantec Endpoint Protection Manager (SEPM) installed on the remote host is prior to 12.1 RU6. It is, therefore, affected by the following vulnerabilities : - A DLL injection vulnerability exists due to improper path restrictions when loading DLLs. An authenticated, local attacker can exploit this to insert malicious DLL files, resulting in the execution of arbitrary code with system permissions. (CVE-2014-9227) - A denial of service vulnerability exists due to a deadlock condition in the
last seen2020-06-01
modified2020-06-02
plugin id84368
published2015-06-24
reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/84368
titleSymantec Endpoint Protection Manager < 12.1 RU6 Multiple Vulnerabilities (SYM15-005)