Hole in Symantec's Storage Foundation allows malicious code execution
Security service provider TippingPoint has discovered a vulnerability in Symantec's (Veritas) Storage Foundation that can allow attackers to manipulate the system and execute arbitrary code. The problem is a lack of authentication for the Windows Scheduler Service (VxSchedService.exe). As a result, everyone can connect to the service on Port 4888 via the local network. Furthermore, TippingPoint says it is also possible to change, rewrite, and add arbitrary commands to the registry key HKEY_LOCAL_MACHINE\Software\Veritas\VxSvc\CurrentVersion\Schedules which can be executed when a manipulated schedule entry becomes due. Only Symantec's Storage Foundation for Windows 5.0 is affected. An update has been provided to remedy the flaw.
- _ Symantec Veritas Storage Foundation Scheduler Service Authentication Bypass Vulnerability_, TippingPoint's security advisory
- _Symantec Storage Foundation for Windows Volume Manager: Authentication Bypass and Potential Code Execution in Scheduler Service_, Symantec's security advisory
(mba)