CVE-2018-18364
https://notcve.org/view.php?id=CVE-2018-18364
Symantec Ghost Solution Suite (GSS) versions prior to 3.3 RU1 may be susceptible to a DLL hijacking vulnerability, which is a type of issue whereby a potential attacker attempts to execute unexpected code on your machine. This occurs via placement of a potentially foreign file (DLL) that the attacker then attempts to run via a linked application. Symantec Ghost Solution Suite (GSS), en versiones anteriores a la 3.3 RU1, podría ser susceptible a una vulnerabilidad de secuestro de DLL, que es un tipo de problema por el cual un atacante potencial intenta ejecutar código inesperado en una máquina. Esto ocurre colocando un archivo potencialmente foráneo (DLL) que el atacante intenta ejecutar mediante una aplicación conectada. • http://www.securityfocus.com/bid/106684 https://support.symantec.com/en_US/article.SYMSA1474.html • CWE-426: Untrusted Search Path •
CVE-2015-5689 – Symantec Ghost Out-Of-Bounds Indexing Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-5689
ghostexp.exe in Ghost Explorer Utility in Symantec Ghost Solutions Suite (GSS) before 3.0 HF2 12.0.0.8010 and Symantec Deployment Solution (DS) before 7.6 HF4 12.0.0.7045 performs improper sign-extend operations before array-element accesses, which allows remote attackers to execute arbitrary code, cause a denial of service (application crash), or possibly obtain sensitive information via a crafted Ghost image. Vulnerabilidad en ghostexp.exe en Ghost Explorer Utility en Symantec Ghost Solutions Suite (GSS) en versiones anteriores a 3.0 HF2 12.0.0.8010 y Symantec Deployment Solution (DS) en versiones anteriores a 7.6 HF4 12.0.0.7045, realiza una operación de extensión de signo indebida antes de los accesos a los elementos del array, lo que permite a atacantes remotos ejecutar código arbitrario, causar una denegación de servicio (caída de la aplicación) o posiblemente obtener información sensible a través de una imagen Ghost manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Ghost. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Ghost images. The issue lies in sign-extending byte values from an array before using them as an index into an array, allowing for out-of-bounds access. • http://www.securityfocus.com/bid/76498 http://www.securitytracker.com/id/1033577 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150902_00 http://zerodayinitiative.com/advisories/ZDI-15-419 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •