Symantec AppStream and Workspace Streaming download code execution
|symantec-appstream-download-ce (59504)||High Risk|
Symantec AppStream and Workspace Streaming could allow a remote attacker to execute arbitrary code on the system, caused by improper authentication with the Symantec Workspace Streaming server when downloading files. By configuring a Workspace Streaming server masquerading as an authorized server, an attacker could exploit this vulnerability to download and execute arbitrary files without interaction from the victim.
Refer to SYM10-008 for patch, upgrade or suggested workaround information. See References.
- SYM10-008: Symantec Workspace Streaming Potential Unauthorized Downloads.
- BID-40611: Symantec Workspace Streaming Server Authentication Arbitrary File Download Vulnerability
- CVE-2008-4389: Symantec AppStream 5.2.x and Symantec Workspace Streaming (SWS) 6.1.x before 6.1 SP4 do not properly perform authentication, which allows remote Workspace Streaming servers and man-in-the-middle attackers to download arbitrary executable files onto a client system, and execute these files, via unspecified vectors.
- OSVDB ID: 65601: Symantec AppStream / Workspace Streaming (SWS) aswe: URI MiTM File Download Arbitrary Code Execution
- SA40233: Symantec AppStream / Workspace Streaming Authentication Security Bypass
- US-CERT VU#221257: Symantec AppStream and Workspace Streaming vulnerable to arbitrary code download and execution
- VUPEN/ADV-2010-1511: Symantec Workspace Streaming Unauthorized Downloads Vulnerability
- Symantec AppStream Client 5.2
- Symantec AppStream Client 5.2.2
- Symantec AppStream Client 5.2.2 SP3 MP1
- Symantec AppStream Client 5.22 SP3 MP1
- Symantec Workspace Streaming 6.1
Jun 16, 2010
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.