Symantec Norton AntiVirus Corporate Edition winhlp32 file could allow elevated privileges
|nav-winhlp32-gain-privileges (10475)||Medium Risk|
Norton AntiVirus Corporate Edition could allow a local attacker to gain elevated privileges on the system, caused by a vulnerability in the Norton help interface process. The Norton AntiVirus help interface uses the Windows winhlp32.exe file to provide help and support to the client, but uses the privileges of Norton AntiVirus Corporate Edition instead of normal winhlp32 privileges. If a local attacker with a valid user account is logged on to the affected system, the attacker may be able to exploit this vulnerability to gain full SYSTEM level privileges.
Upgrade to the latest version of Norton AntiVirus Corporate Edition (7.5.1 Build 62 or later) or (7.6.1 Build 35a or later). Refer to the instructions provided by Symantec in the BugTraq Mailing List posting dated Fri Oct 25 2002 - 11:50:15 CDT for information on obtaining an upgrade. See References.
- BugTraq Mailing List, Fri Oct 25 2002 - 11:50:15 CDT : RE: DH team: Norton Antivirus Corporate Edition Privilege Escalation.
- BugTraq Mailing List, Thu Oct 24 2002 - 05:39:59 CDT : DH team: Norton Antivirus Corporate Edition Privilege Escalation.
- BID-5966: Symantec NAVCE Privilege Escalation Vulnerability
- CVE-2002-1540: The client for Symantec Norton AntiVirus Corporate Edition 7.5.x before 7.5.1 Build 62 and 7.6.x before 7.6.1 Build 35a runs winhlp32 with raised privileges, which allows local users to gain privileges by using certain features of winhlp32.
- OSVDB ID: 18975: Symantec Multiple Products HTML Help Local Privilege Escalation
- OSVDB ID: 4374: Symantec Norton Anti-Virus Corporate Edition winhlp32 Local Privilege Escalation
- OSVDB ID: 6258: Symantec Norton Anti-Virus CE Help File Local Privilege Escalation
- Symantec Norton AntiVirus 7.5 Corporate
- Symantec Norton AntiVirus 7.51 Corporate
- Symantec Norton AntiVirus 7.6 Corporate
Oct 24, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this