Security holes uncovered in Symantec, Norton products
TechWorld.com - Almost the entire range of Symantec Corp. security software, from Norton Internet Security through to the Symantec Firewall, requires urgent updates, the company has warned, after four critical vulnerabilities were found by security company eEye Digital Security Inc.
One of the holes remains open even with all ports filtered and intrusion rules set thanks to a separate design flaw, eEye has warned. This makes it an almost certain target for worm writers, one of which -- if history is any indication -- may be put out on the Internet within 24 hours.
Symantec was informed of the holes on April 19, and provided patches for them today. The patches should be installed as part of the Live Update feature in most packages, but some will require the manual download and installation of patches, and those that have automatic updating switched off will need to run Live Update as soon as possible.
EEye explains in its advisories that the holes, all of which are within the symdns.sys driver, allow system access, the opportunity to create a denial-of-service attack and -- most serious -- an open door to a worm.
In connection with one vulnerability, eEye warned: "With the ability to freely execute code at the Ring 0 privilege level, there are literally no boundaries for an attacker. It should also be noted, that due to a separate design flaw in the firewalls handling of incoming packets, this attack can be successfully performed with all ports filtered, and all intrusion rules set."
Security company Secunia has warned that the last time such a hole appeared -- in ISS's security software, affecting how it handled ICQ traffic -- a worm, Witty, appeared just a day after the exploit was made public.
Symantec has more detail on the flaws with links to patches on its Web site.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts