<<< Date Index >>>     <<< Thread Index >>>

[IP] Symantec Anti-Virus Software Open To Attack





Begin forwarded message:

From: EEkid@xxxxxxx
Date: December 20, 2005 11:32:46 PM EST
To: dave@xxxxxxxxxx
Subject: Symantec Anti-Virus Software Open To Attack

Symantec Anti-Virus Software Open To Attack

The bug, which could result in a completely compromised machine, remains unpatched although Symantec has issued an advisory.

By Gregg Keizer
TechWeb News

Dec 20, 2005 05:06 PM

Symantec's line of anti-virus software is vulnerable to attack, a prominent security researcher revealed Tuesday. The bug is currently unpatched, although Symantec has issued an advisory.

The vulnerability, which was discovered and reported by Alex Wheeler, is in how Symantec's AntiVirus Library, part of all the Cupertino, Calif.-based security giant's anti-virus products, handles RAR compressed files. RAR files are created by the WinRAR compression utility, developed and sold by RarLab.

The bug, labeled as "Highly critical" by Danish vulnerability tracker Secunia and "High" by Symantec itself, can cause a heap overflow, which then may let an attacker execute additional code. Bottom-line: the bug could result in a completely compromised machine.

"The issues can be leveraged remotely to gain complete control over the affected system," Symantec wrote in an alert Tuesday morning to customers of its DeepSight Threat Management System.

All editions of Symantec's Norton Internet Security and Norton AntiVirus, including AntiVirus for the Macintosh, are at risk, as are other products which include the Library. Those include such enterprise-specific lines as AntiVirus Corporate Edition, Brightmail Anti-Spam, Client Security, and Gateway Security.

Symantec has not issued a patch for the vulnerability, but the DeepSight alert recommended that users disable scanning for RAR archive files.

Wheeler is well known among researchers for his probing of security software weaknesses. Earlier in 2005, he disclosed a slew of vulnerabilities in software from major vendors like McAfee, Kaspersky Labs, F-Secure, and Trend Micro. All the bugs he has discovered involve how the various anti-virus scanning engines handle compressed files.

This is the second scanning vulnerability Wheeler has uncovered in Symantec's product line. In February, while working with Internet Security Systems, a Symantec rival, he announced a bug in how Symantec's scanning engine could be hacked as it sniffed through UPX- formatted files.








-------------------------------------
You are subscribed as roessler@xxxxxxxxxxxxxxxxxx
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/