Vulnerability CVE-2018-12238


Published: 2018-11-29

Description:
Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected.

Type:

CWE-254

(Security Features)

Vendor: Symantec
Product: Norton antivirus 
Version:
9.0.6.1000
9.0.5.1100
9.0.5
9.0.4
9.0.3.1000
9.0.3
9.0.2.1000
9.0.2
9.0.1.1000
9.0.1.1.1000
9.0.1
9.0.0.338
9.0.0
9.0
8.1.1.377
8.1.1.366
8.1.1.329
8.1.1.323
8.1.1.319
8.1.1
8.1.0.825a
8.1
8.01.471
8.01.464
8.01.460
8.01.457
8.01.446
8.01.437
8.01.434
8.0.1.501
8.0.1
5.0
2.5
2.1
2.0
10.1
10.0.2.2021
10.0.2.2020
10.0.2.2011
10.0.2.2010
10.0.2.2002
10.0.2.2001
10.0.2.2000
10.0.1.1008
10.0.1.1007
10.0.1.1000
10.0.1
10.0.0.359
10.0.0
10.0
1.0
Product: Endpoint protection 
Version:
12.1.671
12.1.6
12.1.4
12.1.3
12.1.2.1
12.1.2
12.1.1000
12.1.1.1
12.1.1
12.1
12.0
11.0.7100
11.0.7000
11.0.7.3
11.0.7.2
11.0.7.1
11.0.7
11.0.6300
11.0.6200.754
11.0.6200
11.0.6100
11.0.6000
11.0.4
11.0.3001
11.0.2
11.0.1
11.0

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.securityfocus.com/bid/105917
https://support.symantec.com/content/unifiedweb/en_US/article.SYMSA1468.html

Related CVE
CVE-2018-18367
Symantec Endpoint Protection Manager (SEPM) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution ...
CVE-2018-18366
Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptibl...
CVE-2018-12244
SEP (Mac client) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a CSV/DDE injection (also known as formula injection) vulnerability, which is a type of issue whereby an application or website allows untrusted input in...
CVE-2018-18369
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when ...
CVE-2019-9694
Symantec Endpoint Encryption prior to SEE 11.2.1 MP1 may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that...
CVE-2019-9696
Symantec VIP Enterprise Gateway (all versions) may be susceptible to a cross-site scripting (XSS) exploit, which is a type of issue that can enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting v...
CVE-2018-18364
Symantec Ghost Solution Suite (GSS) versions prior to 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of...
CVE-2018-12245
Symantec Endpoint Protection prior to 14.2 MP1 may be susceptible to a DLL Preloading vulnerability, which in this case is an issue that can occur when an application being installed unintentionally loads a DLL provided by a potential attacker. Note ...

Copyright 2019, cxsecurity.com

 

Back to Top