{"vuid":"VU#149070","idnumber":"149070","name":"Symantec Endpoint Protection network threat protection module Microsoft IIS denial of service vulnerability","keywords":["Symantec Endpoint Protectin","DoS","IIS"],"overview":"Symantec Endpoint Protection (SEP) Network Threat Protection module running on a Microsoft Internet Information Services (IIS) webserver contains a denial of service vulnerability when probed by an audit tool.","clean_desc":"Symantec Security Advisory SYM12-007 states: Overview\nVersions of Symantec Endpoint Protection Manager 11.0 running the Network Threat Protection module on Windows Server 2003 are susceptible to a Denial of Service(DoS). Successful exploitation could potentially result in the system hosting Symantec Endpoint Protection Manager becoming unresponsive to IIS-based web server requests until restarted. Details\nSymantec was notified of a Denial of Service(DoS) within the Symantec Endpoint Protection Manager 11 RU6 and related maintenance packs. A successful exploitation is possible when using audit tools to aggressively scan the targeted Symantec Endpoint Protection Manager host. After a period of heavy scanning the Network Threat Protection  module responds to the perceived threat by blocking all subsequent traffic to the server. This can lead the server to stop serving pages and in some instances can cause excessive resource use which can lead to a hang or crash of the server. This issue does not impact the security of the Symantec Endpoint Manager, only the availability of the web server components. It has been reported that this vulnerability affects Microsoft Internet Information Services (IIS) 6.0, however newer versions could be affected.","impact":"An unauthenticated attacker can cause the Microsoft IIS webserver to become unresponsive leading to a denial of service condition.","resolution":"Update The vendor has stated that this vulnerability has been addressed in SEP 11.0.7000 RU7 MP2. Users are advised to upgrade to release SEP 11.0.7000 RU7 MP2 or later. The vendor states that updates will be available through customers’ normal support/download locations.","workarounds":"Restart server or IIS service The vendor has stated that manually restarting the server and/or IIS service will remedy the situation.","sysaffected":"","thanks":"Thanks to Greg Johnson of Clear Skies Security for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","s","y","m","a","n","t","e","c",".","c","o","m","/","s","e","c","u","r","i","t","y","_","r","e","s","p","o","n","s","e","/","s","e","c","u","r","i","t","y","u","p","d","a","t","e","s","/","d","e","t","a","i","l",".","j","s","p","?","f","i","d","=","s","e","c","u","r","i","t","y","_","a","d","v","i","s","o","r","y","&","p","v","i","d","=","s","e","c","u","r","i","t","y","_","a","d","v","i","s","o","r","y","&","y","e","a","r","=","2","0","1","2","&","s","u","i","d","=","2","0","1","2","0","5","2","2","_","0","0"],"cveids":["CVE-2012-1821"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-05-12T17:28:01Z","publicdate":"2012-05-22T00:00:00Z","datefirstpublished":"2012-06-05T12:16:42Z","dateupdated":"2012-06-05T12:16:43Z","revision":15,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"L","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.3","cvss_basevector":"AV:N/AC:M/Au:N/C:N/I:N/A:P","cvss_temporalscore":"3.2","cvss_environmentalscore":"1","cvss_environmentalvector":"CDP:L/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}