Vulnerabilities have been found in Norton Ghost 8.0 and Norton Ghost Suite Solution 1.x
Verify AdvisoriesDESCRIPTION:
Three vulnerabilities have been reported in Symantec Ghost, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, modify certain data, and potentially gain escalated privileges.
1) Default administrator login id and password left behind during installation can be used by local users to modify or delete stored administrative tasks. This can be exploited to modify tasks to run arbitrary code on the local system.
2) Insecure permissions in the shared memory sections within the Sybase SQLAnywhere database used by Symantec Ghost can potentially be exploited to gain access to, and to modify information stored in the database.
3) A boundary error in the login dialog box of dbisqlc.exe which is installed as a part of the SQLAnywhere package, can cause a buffer overflow. This can potentially be exploited to gain access to information stored in the database that is not normally accessible.
The vulnerabilities have been reported in the following versions:
* Symantec Ghost 8.0.
* Symantec Ghost 8.2 (shipped as a part of Symantec Ghost Solutions Suite 1.0).
SOLUTION:
Update to Symantec Ghost 8.3 that is shipped as a part of Symantec
Ghost Solutions Suite 1.1.