F-Secure hit with antivirus vulnerabilities
Physician, heal thyself?
IDG News Service - F-Secure Corp. has patched several vulnerabilities in its security products, the most critical of which could be used to run unauthorized software on a victim's computer.
The most critical of these bugs affects F-Secure's antivirus products. A flaw in the way the software unpacks files that have been compressed using the LHA archiving format, could allow an attacker to crash the system, or even run unauthorized software on the computer, F-Secure said in an advisory, published Wednesday.
This flaw is related to a similar flaw in the Gzip decompression utility that was discovered last September, F-Secure said.
A second less-critical vulnerability in some of the company's antivirus software was also patched Wednesday. This flaw could be used by an attacker with access to the local system to get into unauthorized parts of the system in what is called a privilege escalation attack.
Users of some versions of F-Secure Anti-Virus and Internet Security have been automatically delivered the software patches for these flaws, F-Secure said. A list of which products require hotfixes can be found within F-Secure's security bulletins.
Also on Wednesday, F-Secure fixed a flaw in its Policy Manager Server that could be used by attackers to launch a denial of service attack against the security management software. Secunia rates this bug as "less critical."
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!