[FD] Symantec Endpoint Protection (SEP) v12.1 Tamper-protection Bypass CVE-2017-6331

2017-11-14 Thread hyp3rlinx
[+] Credits: John Page a.k.a hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/CVE-2017-6331-SYMANTEC-ENDPOINT-PROTECTION-TAMPER-PROTECTION-BYPASS.txt [+] ISR: ApparitionSec Vendor: ===www.symantec.com Product: === Symantec

Re: [FD] Symantec Endpoint Protection

2015-08-03 Thread Markus Wulftange
Hi Brandon, we found two injection points. One in the BinaryFileHandler class: POST /servlet/ConsoleServlet HTTP/1.1 Host: 192.168.40.133:8443 Content-Type: application/x-www-form-urlencoded Content-Length: 51 Cookie: JSESSIONID=D739FA0884EB78B31B1D23AEA899C175 ActionType

Re: [FD] Symantec Endpoint Protection

2015-08-01 Thread Brandon Perry
Do you have example requests for the SQL injections? > On Jul 31, 2015, at 7:40 AM, Markus Wulftange > wrote: > > Code White found several vulnerabilities in Symantec Endpoint Protection > (SEP), affecting versions 12.1 prior to 12.1 RU6 MP1. > > SEP Manager (SEPM): > > * CVE-2015-1486: Auth

[FD] Symantec Endpoint Protection

2015-07-31 Thread Markus Wulftange
Code White found several vulnerabilities in Symantec Endpoint Protection (SEP), affecting versions 12.1 prior to 12.1 RU6 MP1. SEP Manager (SEPM): * CVE-2015-1486: Authentication Bypass * CVE-2015-1487: Arbitrary File Write * CVE-2015-1488: Arbitrary File Read * CVE-2015-1489: Privilege Escalatio

[FD] Symantec Endpoint Protection – Remote Buffer Overflow PoC (CVE-2013-1612)

2014-04-26 Thread Jérôme Nokin
Hello, Here is a PoC of the CVE-2013-1612 bug, targeting SEP Manager version 12.1.0 -> 12.1.2. It's a simple SEH-based code which set EIP to 0x. I've tried to write a stable exploit code but so far, it is still unreliable. I meant that it works great in my labs, but will not work on yours