{"vuid":"VU#221257","idnumber":"221257","name":"Symantec AppStream and Workspace Streaming vulnerable to arbitrary code download and execution","keywords":["IE","Internet Explorer","appstream","aswe","workspace streaming","altiris streaming system"],"overview":"The Symantec AppStream and Workspace Streaming clients fail to properly validate downloads, which can allow a remote, unauthenticated attacker to download and execute arbitrary code on a vulnerable system.","clean_desc":"Symantec Workspace Streaming is a software distribution solution that \"streams\" applications to client desktops. Older versions of the software are known as AppStream or Altiris Streaming System. The Symantec Workspace Streaming client is configured to handle the aswe protocol. By processing an aswe:// URI, the Symantec Workspace Streaming client will download and execute applications from the specified Workspace Streaming server. The Symantec Workspace Streaming client and prior variants fail to properly authenticate with the server component of the software.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a webpage or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. Other mechanisms for accessing the Workspace Streaming Client, e.g., via the aswe protocol handler, can have the same impact.","resolution":"Apply an update\nThis issue is addressed in Symantec Workspace Streaming 6.1 SP4. Please see Symantec Advisory SYM10-008 for more details.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Will Dormann of the CERT/CC.","author":"This document was written by Will Dormann.","public":["http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100616_00","https://fileconnect.symantec.com/","http://www.securityfocus.com/bid/40611","http://secunia.com/advisories/40233/"],"cveids":["CVE-2008-4389"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-11-21T18:02:56Z","publicdate":"2010-06-16T00:00:00Z","datefirstpublished":"2010-06-17T13:49:43Z","dateupdated":"2010-06-18T13:08:01Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"8","cam_impact":"15","cam_easeofexploitation":"9","cam_attackeraccessrequired":"18","cam_scorecurrent":"8.019","cam_scorecurrentwidelyknown":"11.664","cam_scorecurrentwidelyknownexploited":"18.954","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.019,"vulnote":null}