LUA listed by vulnerability scanners as susceptible to shutdown exploitation.
search cancel

LUA listed by vulnerability scanners as susceptible to shutdown exploitation.

book

Article ID: 234014

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction

During vulnerability scanning you are advised the Liveupdate Administrator is vulnerable to a Remote shutdown exploit on port 8005.   

Environment

Windows 2008-r2, Windows 2012, Windows 2016, Windows 2019, Windows 10

All Versions of Tomcat in the Liveupdate Administrator product.

Cause

The Liveupdate administrator uses a default install of Tomcat/Apache to manage file distribution to client devices.  In this default state Remote shutdown port is active but useable only on the local host itself.  Because vulnerability scanners only validate if the 'function is enabled' and not the actual configuration of the port the device is flagged as vulnerable erroneously. 

Resolution

To stop vulnerability scanners from triggering on the shutdown entry in the SERVER.XML you can modify the Liveupdate Administrators SERVER.XML Shutdown port entry as follows ::


Make a Desktop COPY of the Liveupdate Administrator's SERVER.XML
Open and EDIT the Liveupdate Administrator copy of the SERVER.XML in C:\Program Files (x86)\Symantec\LiveUpdate Administrator\tomcat\conf
Find line below and alter the port within the quotes to a -1 values as seen below.

Find >
<Server port="8005" shutdown="SHUTDOWN">

Change to >
<Server port="-1" shutdown="SHUTDOWN">

This will close the port.  And the vulnerability scanner should no longer trigger on the Liveupdate Administrator.

Restart the device or restart the Liveupdate Administrator services to force the port to close. 


Source link:
https://tomcat.apache.org/tomcat-5.5-doc/config/server.html#Common_Attributes