High-severity bugs in 25 Symantec/Norton products imperils millions

TheRyuu

Diamond Member
Dec 3, 2005
5,479
14
81
http://arstechnica.com/security/201...-wormable-attack-by-unopened-e-mail-or-links/

Quote from the article:
Because Symantec uses a filter driver to intercept all system I/O, just emailing a file to a victim or sending them a link to an exploit is enough to trigger it - the victim does not need to open the file or interact with it in anyway. Because no interaction is necessary to exploit it, this is a wormable vulnerability with potentially devastating consequences to Norton and Symantec customers.

An attacker could easily compromise an entire enterprise fleet using a vulnerability like this. Network administrators should keep scenarios like this in mind when deciding to deploy Antivirus, it’s a significant tradeoff in terms of increasing attack surface.

Project Zero blog post which is more technical and in depth.:
https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html

HN discussion:
https://news.ycombinator.com/item?id=11998774
 
Last edited:

Elixer

Lifer
May 7, 2002
10,371
762
126
It is moments like this where you wonder how Symantec got to be so huge with all these flaws.
They are in the security business, yet, they don't audit their own code?

Norton Security, Norton 360, and other legacy Norton products (All Platforms)
Symantec Endpoint Protection (All Versions, All Platforms)
Symantec Email Security (All Platforms)
Symantec Protection Engine (All Platforms)
Symantec Protection for SharePoint Servers
and more...
 

Captante

Lifer
Oct 20, 2003
30,342
10,860
136
Noticed my Norton Security download & install a good-sized patch earlier today ... coincidence?

o_O


Anyway sucks that it takes these flaws being publicized before anything is done!
 

Phynaz

Lifer
Mar 13, 2006
10,140
819
126
Noticed my Norton Security download & install a good-sized patch earlier today ... coincidence?

o_O


Anyway sucks that it takes these flaws being publicized before anything is done!

It was patched before the public disclosure.