Description
Buffer overflow in the sysplant driver in Symantec Endpoint Protection (SEP) Client 11.x and 12.x before 12.1 RU4 MP1b, and Small Business Edition before SEP 12.1, allows local users to execute arbitrary code via a long argument to a 0x00222084 IOCTL call.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ryujin & sickness · pythonlocalwindows
https://www.exploit-db.com/exploits/34272
References (9)
Core 9
Core References
Vendor Advisory x_refsource_confirm
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20140804_00
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/109663
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/68946
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/95062
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/252068
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/58996
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/59697
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/34272
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.com/files/127772/Symantec-Endpoint-Protection-11.x-12.x-Kernel-Pool-Overflow.html
Scores
EPSS
0.0063
EPSS Percentile
70.4%
Details
CWE
CWE-119
Status
published
Products (3)
symantec/endpoint_protection
11.0
symantec/endpoint_protection
12.0
symantec/endpoint_protection
12.1
Published
Aug 06, 2014
Tracked Since
Feb 18, 2026