- Jun 9, 2013
- 6,720
Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and consumer AV products.
The flaws affect the core engine deployed in the products and are, according to Ormandy, “as bad as it gets.”
“They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption,” he noted.
The latter is possible because Symantec runs executable file unpackers directly in the kernel.
One of the vulnerabilities (CVE-2016-2208), a trivial buffer overflow, can lead to kernel memory corruption on Windows machines, and can be triggered by the victim simply receiving (and not opening) a specially crafted file or link via email.
Full Article. Symantec, Norton AV products are riddled with serious flaws - Help Net Security
The flaws affect the core engine deployed in the products and are, according to Ormandy, “as bad as it gets.”
“They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption,” he noted.
The latter is possible because Symantec runs executable file unpackers directly in the kernel.
One of the vulnerabilities (CVE-2016-2208), a trivial buffer overflow, can lead to kernel memory corruption on Windows machines, and can be triggered by the victim simply receiving (and not opening) a specially crafted file or link via email.
Full Article. Symantec, Norton AV products are riddled with serious flaws - Help Net Security