Educause Security Discussion mailing list archives
Four Critical Vulnerabilities Involving Symantec
From: Rodney Petersen <rpetersen () EDUCAUSE EDU>
Date: Tue, 18 May 2004 06:56:12 -0600
The following information has been provided to me regarding Symantec vulnerabilities reported last week. Rodney Petersen Security Task Force Coordinator, EDUCAUSE SYMANTEC'S EXTERNAL STATEMENT as of MAY 13, 2004: "In mid-April, eEye Digital reported four product vulnerabilities to Symantec. The vulnerabilities affected consumer and corporate client firewall products and Norton AntiSpam 2004. Fixes to the four vulnerabilities have been issued through Symantec LiveUpdate and technical support channels. To date, Symantec has not had any reports of any related exploit of the vulnerabilities. Three of the vulnerabilities, if exploited, could potentially allow remote access to the targeted system. The fourth vulnerability, if exploited, could potentially cause a denial of service. Symantec's security advisory was posted on May 12, 2004, and can be found at http://securityresponse.symantec.com/avcenter/security/Content/2004.05.1 2.html." _____ Tom Resau PR Manager, Public Sector Symantec Corporation Office: 703-668-8743 Interoffice: 6 [703] 8743 Fax: 703-668-8703 Email: thomas_resau () symantec com <mailto:thomas_resau () symantec com> www.symantec.com <http://www.symantec.com/> MAY 13, 2004 (TECHWORLD.COM) <HTTP://www.techworld.com/> - Almost the entire range of Symantec Corp. security software, from Norton Internet Security through to the Symantec Firewall, requires urgent updates, the company has warned, after four critical vulnerabilities were found by security company eEye Digital Security Inc. <http://www.eeye.com/html/Research/Advisories/index.html> One of the holes remains open even with all ports filtered and intrusion rules set thanks to a separate design flaw, eEye has warned. This makes it an almost certain target for worm writers, one of which -- if history is any indication -- may be put out on the Internet within 24 hours. Symantec was informed of the holes on April 19, and provided patches for them today. The patches should be installed as part of the Live Update feature in most packages, but some will require the manual download and installation of patches, and those that have automatic updating switched off will need to run Live Update as soon as possible. EEye explains in its advisories that the holes, all of which are within the symdns.sys driver, allow system access, the opportunity to create a denial-of-service attack and -- most serious -- an open door to a worm. In connection with one vulnerability, eEye warned: "With the ability to freely execute code at the Ring 0 privilege level, there are literally no boundaries for an attacker. It should also be noted, that due to a separate design flaw in the firewalls handling of incoming packets, this attack can be successfully performed with all ports filtered, and all intrusion rules set." Security company Secunia <http://secunia.com/> has warned that the last time such a hole appeared -- in ISS's security software, affecting how it handled ICQ traffic -- a worm, Witty, appeared just a day after the exploit was made public. Symantec has more detail on the flaws with links to patches on its Web site <http://www.symantec.com/downloads/> . ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/.
Current thread:
- Four Critical Vulnerabilities Involving Symantec Rodney Petersen (May 18)