Latest flaws affect AV giants

Posted by   Virus Bulletin on   May 11, 2007

Symantec, McAfee and CA all patch vulnerabilities.

Three of the biggest names in the security sector, McAfee, Symantec and CA, have all revealed details of flaws in their software which have been discovered and patched in recent months.

The most severe vulnerability was suffered by a wide range of McAfee products, including its flagship VirusScan and Internet Security Suite software. A buffer overflow error in the Subscription Manager ActiveX control could allow code to be executed from malicious websites, resulting in system compromise and remote access. The problem was discovered by iDefense researchers, who describe exploitation of the flaw as 'trivial' in their advisory, here. The issue was patched by McAfee automated updates in late March - some information from McAfee is here, and a Secunia alert, rating the issue 'Highly Critical', is here.

The Symantec issue also involves an ActiveX control, used by some of its Norton products including Norton Internet Security 2006. It could also be exploited by malicious websites to bypass security measures and possibly allow remote access, but is generally considered a less serious threat to users. Another iDefense advisory is here, Symantec's own alert is here and a Secunia summary is here.

iDefense, alongside the Zero Day Initiative (ZDI), was behind the reporting of the CA flaws too, with two buffer-overflow issues affecting some of the company's anti-virus and anti-spyware products. The vulnerabilities could only be exploited from the local system, and may have allowed escalated privileges. Details are here (from CA), here (from iDefense) and here (from ZDI), with another Secunia summary here.

All the reported problems have been fixed by updates and patch releases, which should be applied automatically in most cases. Anyone running the affected products is advised to ensure they are running the latest versions.

Posted on 11 May 2007 by Virus Bulletin



Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.