(2nd try).

TITLE:
Symantec Ghost Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA19171

VERIFY ADVISORY:
http://secunia.com/advisories/19171/

CRITICAL:
Less critical

IMPACT:
Manipulation of data, Exposure of sensitive information,
Privilege escalation

WHERE:
Local system

SOFTWARE:
Symantec Ghost 8.x
http://secunia.com/product/6937/
Symantec Ghost Solution Suite 1.x
http://secunia.com/product/8600/

DESCRIPTION:
Three vulnerabilities have been reported in Symantec Ghost,
which can be exploited by malicious, local users to gain
knowledge of potentially sensitive information, modify certain
data, and potentially gain escalated privileges.

1) Default administrator login id and password left behind
during installation can be used by local users to modify or
delete stored administrative tasks. This can be exploited to
modify tasks to run arbitrary code on the local system.

2) Insecure permissions in the shared memory sections within
the Sybase SQLAnywhere database used by Symantec Ghost can
potentially be exploited to gain access to, and to modify
information stored in the database.

3) A boundary error in the login dialog box of dbisqlc.exe
which is installed as a part of the SQLAnywhere package, can
cause a buffer overflow. This can potentially be exploited to
gain access to information stored in the database that is not
normally accessible.

The vulnerabilities have been reported in the following
versions:
* Symantec Ghost 8.0.
* Symantec Ghost 8.2 (shipped as a part of Symantec Ghost
Solutions Suite 1.0).

SOLUTION:
Update to Symantec Ghost 8.3 that is shipped as a part of
Symantec Ghost Solutions Suite 1.1.

ORIGINAL ADVISORY:
http://securityresponse.symantec.com/avcenter/security/Content/2006.03.07.html
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to