Sponsored By

Symantec Vulnerability Revealed

EEye Digital Security uncovers remotely exploitable vulnerability in Symantec anti-virus program

Mike Fratto

May 25, 2006

2 Min Read

EEye Digital Security revealed this afternoon a software vulnerability inside Symantec's Anti-Virus Corporate Edition 10.0.

The vulnerability warning, posted on the vendor's Upcoming Advisories page, requires no user intervention and could be used to create a worm. A Symantec representative told Dark Reading that eEye notified Symantec of the problem today and it is investigating the issue.

Marc Maiffret, eEye's co-founder and chief hacking officer, said, "Symantec hasn't gotten back to us with a timeline yet, but they are very responsive to vulnerability reporting and quickly fix problems compared to other vendors we work with, like Microsoft."

EEye also tested Symantec's consumer security suite, Norton Internet Security 2006, which eEye uses, and found that it was not vulnerable. "We don't know how many other Symantec products are affected because of bundling," Maiffret said. "But with Symantec's large deployment footprint, a worm could spread fast."

Since the problem affects Symantec's Corporate Edition and is remotely exploitable, some experts deduced that the problem may lie with the software that handles centralized management. However, this could not be confirmed with eEye or Symantec.

According to eEye, its researchers were working to integrate its host protection product, Blink, with Anti-Virus Corporate Edition and decided to test the application. To eEye's surprise, it took little more than a week to find the vulnerability and create a working exploit.

Maiffret thinks the ease and speed of finding an exploitable bug may indicate development problems in Symantec. "Finding exploitable bugs in security software is bad enough, but finding generic problems like stack-based buffer overflow indicates systemic issues. Using secure development practices is costly for small developers, but a billion-dollar company like Symantec can afford it."

— Mike Fratto, Editor at Large, Dark Reading

Organizations mentioned in this story:

About the Author(s)

Mike Fratto

Former Network Computing Editor

Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics and executive editor for Secure Enterprise. He has spoken at several conferences including Interop, MISTI, the Internet Security Conference, as well as to local groups. He served as the chair for Interop's datacenter and storage tracks. He also teaches a network security graduate course at Syracuse University. Prior to Network Computing, Mike was an independent consultant.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights