Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

BID:13140

Info

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

Bugtraq ID: 13140
Class: Access Validation Error
CVE: CVE-2005-1103
Remote: No
Local: Yes
Published: Apr 12 2005 12:00AM
Updated: Jul 12 2009 12:56PM
Credit: Discovery of this issue is credited to Mazin Faour.
Vulnerable: Sygate Security Agent 4.1
Sygate Security Agent 4.0
Sygate Security Agent 3.5 build 2577
Sygate Security Agent 3.5 build 2576
Not Vulnerable:

Discussion

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

Sygate Security Agent (SSA) is prone to a security vulnerability. The application fails to control which users may Export and Import security policy files.

A local attacker may export and edit an SSA XML security policy file, and may then import the changed file into the affected software. This may allow the attacker to change security settings in SSA, i.e. trusted IP address, or DNS names, or crash the software.

A local attacker may exploit this issue to bypass the SSA security restrictions.

This issue only exists when the software is running in SSA running in 'Server Control' or 'Power User' Modes.

Exploit / POC

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

No exploit is required.

Solution / Fix

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

Solution:
Reports indicate that the vendor has released SSA3.5 build 2580, SSA4.0 build 2715, and SSA4.1 build 2827 to address this issue. This is not confirmed. Customers are advised to contact the vendor for information regarding obtaining and applying appropriate fixes.

References

Sygate Security Agent XML Security Policy File Local Bypass Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report