Symantec under fire for bugs, flaws

IDG News Service |  Endpoint Security, Network access control

It's shaping up to be a bad week for antivirus software company Symantec Corp., after researchers raised alarms about security holes and buggy code in two of the company's products.

Symantec did not immediately respond to requests for comment on the two security issues.

On Monday, Symantec acknowledged a report about a serious security flaw in Symantec Security Check, a free online service that enables users to scan their computer's vulnerability to a number of security threats.

According to a message posted in the online discussion group Full-Disclosure on Sunday, an ActiveX control installed by the Security Check service contains a buffer overflow vulnerability that could enable a remote attacker to crash or run malicious code on systems that had the control installed.

The control, named "Symantec RuFSI Utility Class" or "Symantec RuFSI Registry Information Class," is used to run the security check, but remains on systems after the scan is complete, according to a statement from Symantec.

After learning of the security hole on Monday, Symantec updated the ActiveX control in the Security Check service. Individuals that re-scanned their systems would receive the updated control.

Symantec also provided instructions on updating the control or removing it from affected systems.

However, security researchers monitoring the issue noted that simply updating the control still left users vulnerable to attack, especially if that control contains Symantec's digital signature.

Attackers who have a copy of the flawed ActiveX code with a valid digital signature could trick Microsoft Corp. Windows systems into accepting the control, opening that system to attack even if it did not already have the faulty component installed, according to a notice posted to Full-Disclosure by Jason Coombs, a software security expert in Kea'au, Hawaii.

Symantec also found itself in hot water on Monday after customers using Symantec AntiVirus Corporate Edition reported that an automated antivirus definition update from the Cupertino, California, company caused the antivirus software to fail. The problem was disclosed in the NTBugtraq discussion list on Monday.

The problem stemmed from a faulty antivirus "microdefinition update" distributed on June 19, according to Russ Cooper, NTBugtraq moderator and surgeon general of TruSecure Corp.

Microdefinition updates are a new feature with Version 8 of the Symantec AntiVirus Corporate Edition that enable systems running the software to download small, incremental antivirus definition updates rather than large, comprehensive definition update files, Cooper said.

Symantec's antivirus software would not start on desktop systems that installed the faulty update, leaving some customers without antivirus protection on desktops and servers running the software.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Ask a Question