Americas

  • United States

Asia

Oceania

by Dave Gradijan

Symantec Exterminates Antivirus Bug

News
May 30, 20062 mins
CSO and CISOData and Information Security

Symantec has patched a widely reported flaw in the English versions of its corporate antivirus software.

The flaw, which affects recent versions of its Client Security and Antivirus Corporate Edition products, is considered serious, and could be exploited by hackers to run unauthorized software on unpatched PCs.

It was discovered by rival security vendor eEye Digital Security and first disclosed last Wednesday. Three days later, Symantec patched the problem, according to an alert published Saturday on Symantec’s website.

The patches are for English-language versions of Symantec’s products only, and a Symantec spokesman could not say when the complete line of products would be patched.

Symantec did not release many details on the flaw, but eEye has warned that it is the kind of vulnerability that could be used to build a self-replicating worm attack, similar to the Blaster and Slammer outbreaks of 2003.

That has not happened to date, and Symantec is “not aware of any customers impacted by this vulnerability, or of any exploits of this vulnerability,” the alert said.

The problem affects version 3.0 and above of Client Security, and version 10 and above of Antivirus Corporate Edition. Symantec’s Norton line of consumer antivirus products is not affected.

A number of other flaws have been reported in Symantec’s security products over the past year. In December, researcher Alex Wheeler discovered a flaw in Symantec’s Antivirus Library that could allow remote attackers to gain control of systems that used Symantec’s products. Research about the flaw can be found online.

In October, a critical flaw was found in the company’s Scan Engine software. Information about the flaw can be found online.

EEye’s note on the flaw can be found here.

-Robert McMillan, IDG News Service

For related news coverage, read Flaw Found in Symantec Antivirus.

Keep checking in at our CSO Security Feed page for updated news coverage.