Note: LDAPS Service Heap Memory Corruption vulnerability in SEMS <= 3.3.2 MP12 allowing for reads to from or writes to a memory location outside the buffer’s intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Summary
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer’s intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Affected Versions
- Symantec Encryption Management Server <= 3.3.2 MP11
CVSSv3 Score
7.5 (High)
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Technical Details
A repeatable crash was discovered in the LDAPS service running on the appliance. Reproduced with a single Python command:
| |
This triggers a SIGSEGV signal, causing the service to exit. Both LDAP and LDAPS become unavailable until the service automatically restarts — making this a reliable denial of service against the directory service at minimum, and worth further investigation for exploitation potential.
Timeline
| Date | Event |
|---|---|
| 2015-07-06 | Vulnerability discovered |
| 2015-07-30 | Vendor contacted |
| 2015-08-02 | Vendor confirms issue |
| 2016-02-19 | Patch released (v3.3.2 MP12) |
| 2016-06-07 | Public disclosure |
Remediation
Symantec product engineers have addressed these issues in Symantec Encryption Management Server 3.3.2 MP12. Customers should update to SEMS 3.3.2 MP12 as soon as possible to address these issues.
Credit
Discovered and reported by Toby Reynolds following responsible disclosure guidelines.