Nearly 30 Symantec Titles Open To Attack - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Nearly 30 Symantec Titles Open To Attack

Symantec releases patches for a vulnerability found in a large number of its products, including flagship titles such as BrightMail AntiSpam, AntiVirus Corporate Edition, and its 2004 consumer slate.

Symantec on Tuesday released patches for a vulnerability found in a large number of its products, including flagship titles such as BrightMail AntiSpam, AntiVirus Corporate Edition, and its 2004 consumer slate.

According to rival Internet Security Systems' X-Force research group, which discovered the flaw, the bug is in the DEC2EXE module of the Symantec Antivirus Library, a part of the scanning engine that's able to peek into compressed executable files squeezed with the UPX (Ultimate Packer for eXecutables) format.

"This vulnerability can be triggered by an unauthenticated remote attacker, without user interaction, by sending an e-mail containing a crafted UPX file to the target Symantec AntiVirus Library on client, server, and gateway implementations," said X-Force in its advisory. A successful attack could give the attacker complete control of the supposedly-protected system.

Symantec ranked the danger as "High," while Danish security firm Secunia, which also posted a warning, rated it as "Highly Critical."

Symantec posted a security alert on its Web site that listed the 29 vulnerable Windows (and Macintosh) products, along with recommendations to update and/or upgrade the flawed software.

The Cupertino, Calif.-based security giant spun the news by claiming that even before ISS notified it of the vulnerability, it had already removed the DEC2EXE module from the scan engine upgrades in most of its products. It now plans to strip the offending module from all affected versions during upcoming maintenance releases.

Even though a rival dug up the bug, there didn't seem to be any ill feelings on Symantec's part. "Symantec appreciates the actions of the X-Force research team and X-Force's Alex Wheeler in particular for identifying this issue to Symantec and their cooperation and coordination while Symantec worked to resolve all issues," the company said in a statement.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
News
Top 10 Data and Analytics Trends for 2021
Jessica Davis, Senior Editor, Enterprise Apps,  11/13/2020
Commentary
Where Cloud Spending Might Grow in 2021 and Post-Pandemic
Joao-Pierre S. Ruth, Senior Writer,  11/19/2020
Slideshows
The Ever-Expanding List of C-Level Technology Positions
Cynthia Harvey, Freelance Journalist, InformationWeek,  11/10/2020
Register for InformationWeek Newsletters
Video
Current Issue
Why Chatbots Are So Popular Right Now
In this IT Trend Report, you will learn more about why chatbots are gaining traction within businesses, particularly while a pandemic is impacting the world.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll