Security News Bug in Symantec’s anti-virus engine can lead to system compromise

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
Google Project Zero researcher Tavis Ormandy has unearthed a critical remote code execution vulnerability in the anti-virus engine powering Symantec’s endpoint security products (including Norton-branded ones).

The flaw (CVE-2016-2208) has been responsibly disclosed to the company, and it released a new version of its Anti-Virus Engine (v20151.1.1.4) with the fix incorporated. It will delivered to customers via LiveUpdate along with the usual definition and signature updates, Symantec reassured.

In the security advisory accompanying the security update, Symantec noted twice that “the most common symptom of successful exploitation resulted in an immediate system crash,” aka the “Blue Screen of Death.”

bsod.jpg


Full Article. Bug in Symantec's anti-virus engine can lead to system compromise - Help Net Security
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Google isn't in the business of providing Antivirus software, but they provide top protection with Google Safe Browsing. However, you asked what others thought and that's my opinion. Anyway security-as-a-service is superior to traditional Antivirus, just look at the current landscape.
 

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
@frogboy, thank you sharing/posting this. Shortly after running Liveupdate, and then a quick scan, I experienced a :eek:BSOD. Although by habit I regularly run updates, it's ever an unfolding mystery living alongside The Matrixo_O for which a bit more conscious protection is always very welcome!:cool:
 
Last edited:

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
@frogboy, thank you sharing/posting this. Shortly after running Liveupdate, and then a quick scan, I experienced a :eek:BSOD. Although by habit I regularly run updates, it's ever an unfolding mystery living alongside The Matrixo_O for which a bit more conscious protection is always very welcome!:cool:
Oh no. that is bad. :eek:
 

omidomi

Level 71
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Apr 5, 2014
6,001
The antivirus engine used in multiple Symantec products has an easy-to-exploit vulnerability that could allow hackers to easily compromise computers.

The flaw was fixed by Symantec in Anti-Virus Engine (AVE) version 20151.1.1.4, released Monday via LiveUpdate. The flaw consists of a buffer overflow condition that could be triggered when parsing executable files with malformed headers.

According to Google security engineer Tavis Ormandy, who found the flaw, the vulnerability can be exploited remotely to execute malicious code on computers. All it takes is for the attacker to send an email with the exploit file as attachment or to convince the user to visit a malicious link.

Executing the file is not necessary, because the antivirus engine uses a driver to intercept all system input and output operations and will automatically scan the file as soon as it reaches the file system in any way.

The file extension doesn’t matter, as long as the file has a header identifying it as a portable executable file packed with ASPack, a commercial compressor utility.

The worst part about it is that the Symantec AVE unpacks such files inside the kernel, the highest privileged region of the OS. This means that successful exploitation can lead to a full system compromise.

“On Linux, Mac and other UNIX platforms, this results in a remote heap overflow as root in the Symantec or Norton process,” Ormandy said in an advisory. “On Windows, this results in kernel memory corruption, as the scan engine is loaded into the kernel, making this a remote ring0 memory corruption vulnerability—this is about as bad as it can possibly get.”

Symantec has rated the vulnerability with a 9.1 severity score out of 10 in the Common Vulnerability Scoring System (CVSS).

“The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death (BSOD),” the company said in its own advisory.

Users should make sure that they install the latest available updates available for their Symantec antivirus products and can check the version of the AVE using instructions on Symantec’s support website.

This is the latest in a long string of critical vulnerabilities found by Ormandy and other security researchers in antivirus products in recent years. Most of them have criticized antivirus vendors for continuing to perform dangerous file scanning operations, which historically have resulted in vulnerabilities, using kernel privileges.

source: A critical Symantec antivirus engine flaw puts PCs at risk of easy hacking
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top