Two vulnerabilities have been reported in Symantec Altiris Deployment Solution, which can be exploited by malicious people to disclose potentially sensitive information and by malicious, local users to gain escalated privileges.
1) The Aclient process runs with SYSTEM privileges and allows opening and execution of arbitrary files with SYSTEM privileges via the browser option.
2) An input validation error in the tftp/mftp service included in the PXE server component can be exploited to download arbitrary files via directory traversal attacks.
The vulnerabilities are reported in versions 6.x SP2 (#1) and 6.8 SP2 (#2).
Solution: Update to version 6.8.380.0 (see vendor's advisories for more information).
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Symantec Altiris Deployment Solution Directory Traversal and Privilege Escalation
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.