Security News Symantec patches over twenty products after Google discovers zero-day flaws

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
NkLii7W.jpg


These days, users can be lulled into a false sense of security once they have installed an antivirus or anti-malware solution on their computers. While a number of vendors, including Symantec, release daily updates to malware definitions, this still allows brand new exploits to be leveraged until they are discovered and indexed.

Unfortunately, like any other software installed on a computer, anti-malware solutions can provide an additional vector for malicious parties to compromise a system.

Google Project Zero security researcher Tavis Ormandy recently discovered "multiple critical vulnerabilities" in addition to "many wormable remote code execution flaws" in a wide range of Symantec software.

In his update on the Project Zero website, Ormandy said that:

These vulnerabilities are as bad as it gets. They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption.

One of the critical vulnerabilities targeted a bug in the unpacker used by the core scan engine found in all Symantec and Norton branded products. While Symantec's unpacker contained code which had been derived from open source libraries, Ormandy criticized the company for not updating them "in at least 7 years." As a result, Symantec's software was affected by dozens of public vulnerabilities, some of them with published exploits.

The full list of affected software can be found on the Symantec website, with notable consumer-oriented mentions including, but not limited to:
  • Norton 360
  • Norton Antivirus
  • Norton Internet Security
  • Norton Security
While the discovered flaws have already been patched and updates distributed automatically where available, it may be worth your while to manually verify that your software is up to date.

The news comes two months after Symantec made a beta version of Norton Security Premium 2017 available to the public.
 
H

hjlbx

Ehjh I use Avast. Its not THAT buggy. :eek: Right?!

Project Zero hasn't gotten to Avast yet... they are checking for vulnerabilities in the program code itself - and not the program's actual ability to protect the system or bugs.

If Project Zero gives a security soft their blessing - they are not saying "Hey, this product will protect your system."

What they are really saying is: "Hey, we couldn't exploit the program code itself..." or "Hey, the vendor fixed the exploitable code we found and reported..."
 
Last edited by a moderator:

_CyberGhosT_

Level 53
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 2, 2015
4,286
Agreed hjlbx,
but it is a handy bit of information to have, it paints a picture in and of itself.
I did like 360 used it for quite some time, was mad at them when they stopped
development on it and killed it off, they were moving in the right direction with
Norton 360. I wonder what triggered the abrupt 180 concerning Norton 360.
PeAcE
 
  • Like
Reactions: frogboy

spaceoctopus

Level 16
Verified
Top Poster
Content Creator
Well-known
Jul 13, 2014
766
Project Zero hasn't gotten to Avast yet... they are checking for vulnerabilities in the program code itself - and not the program's actual ability to protect the system or bugs.

If Project Zero gives a security soft their blessing - they are not saying "Hey, this product will protect your system."

What they are really saying is: "Hey, we couldn't exploit the program code itself..." or "Hey, the vendor fixed the exploitable code we found and reported..."
Project Zero had found a zero-day exploit in Avast and was patched, but it was last year:

Zero-Day Exploit Found in Avast Antivirus

:)
 
  • Like
Reactions: frogboy
H

hjlbx

What other AV's have they tested that have had poor results, they ever tested Emsisoft??


Issues - project-zero - Project Zero - Monorail

Tested (to some extent - some more than others - what they find initially might or might not lead to more in-depth inspection):

COMODO, Kaspersky, Bromium, Avast, Symantec\Norton, ESET, Malwarebytes, Trend Micro, Windows 8.1 OS, FireEye, AVG, Mac OSX and iPhone, Safari, Internet Explorer, Chrome, Adobe Flash, Adobe Reader, Samsung Galaxy, Microsoft Office 2007, Windows Task Scheduler (YES - Exploitable !), Libre, Windows drivers, NVidia drivers, Free Type 2.5.3, Oracle Java, VMWare, Wireshark, Windows Hyper-V, Foxit PDF, etc...

All the above were found to have various vulnerabilities - some much more than others - for example, Wireshark had a large number.

No Emsisoft testing.
 
  • Like
Reactions: _CyberGhosT_

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Not surprise, an AV should focus more on self protection.

Not just basic protection but multiple techniques to ensure more harder vulnerabilities to expose.

Unfortunately many companies does not represent protection but rather money only.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top