http://arstechnica.com/security/201...-wormable-attack-by-unopened-e-mail-or-links/
Quote from the article:
Project Zero blog post which is more technical and in depth.:
https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html
HN discussion:
https://news.ycombinator.com/item?id=11998774
Quote from the article:
Because Symantec uses a filter driver to intercept all system I/O, just emailing a file to a victim or sending them a link to an exploit is enough to trigger it - the victim does not need to open the file or interact with it in anyway. Because no interaction is necessary to exploit it, this is a wormable vulnerability with potentially devastating consequences to Norton and Symantec customers.
An attacker could easily compromise an entire enterprise fleet using a vulnerability like this. Network administrators should keep scenarios like this in mind when deciding to deploy Antivirus, its a significant tradeoff in terms of increasing attack surface.
Project Zero blog post which is more technical and in depth.:
https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html
HN discussion:
https://news.ycombinator.com/item?id=11998774
Last edited: