Symantec Scan Engine administrative web interface fails to properly authenticate users, which may allow a remote attacker to gain administrative access to the software.
The Symantec Scan Engine provides a programming interface to Symantec content scanning and virus detection services. The Symantec Scan Engine includes an administrative interface that is enabled and listening on port 8004/tcp by default.
The web interface to Symantec Scan Engine uses a client-side Java applet to perform authentication. No authentication is performed on the server side.
A remote, unauthenticated attacker may be able to gain access to the Symantec Scan Engine software. At the time of publication of this document, exploit code to remotely change the administrator password is available.
Apply an update
This vulnerability was disclosed by Symantec, who in turn credit Rapid7 with reporting the issue.
This document was written by Will Dormann.
|Date First Published:||2006-05-01|
|Date Last Updated:||2006-05-01 21:53 UTC|