Vulnerability Details : CVE-2013-5011
Unquoted Windows search path vulnerability in the client in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 allows local users to gain privileges via a crafted program in the %SYSTEMDRIVE% directory.
Vulnerability category: Directory traversal
Exploit prediction scoring system (EPSS) score for CVE-2013-5011
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-5011
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2013-5011
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-5011
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140109_00
Symantec Endpoint Protection Privilege Assumption, Policy Bypass, Local Elevation of PrivilegeVendor Advisory
-
http://www.securityfocus.com/bid/64130
Symantec Endpoint Protection CVE-2013-5011 Local Privilege Escalation Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90226
Symantec Endpoint Protection search paths privilege escalation CVE-2013-5011 Vulnerability Report
Products affected by CVE-2013-5011
- cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6200.754:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*