Apparently a gaping security flaw in the latest versions of Symantec’s anti-virus software suite has been discovered that could put millions of users at risk of a debilitating worm attack. According to eEye Digital Security, the company that discovered the flaw, the vulnerability could be exploited by remote hackers to take complete control of the target machine ‘without any user action’.
It sounds pretty serious.
“This is definitely wormable. Once exploited, you get a command shell that gives you complete access to the machine. You can remove, edit or destroy files at will,” said eEye Digital Security spokesperson Mike Puterbaugh.
Shame there are no real technical details, there is a brief advisory from eEye.
A remotely exploitable vulnerability exists within the Symantec Antivirus program. This flaw does not require any end user interaction for exploitation and can compromise affected systems, allowing for the execution of malicious code with SYSTEM level access.
It is a vector that hasn’t been fully exploited yet, AV and Firewall software tends to run at system level, so if you can exploit it you pretty much have full control over the machine.
Internet security experts have long warned that flaws in anti-virus products will become a big target for malicious hackers. During the last 18 months, some of the biggest names in the anti-virus business have shipped critical software updates to cover code execution holes, prompting speculation among industry watchers that it’s only a matter of time before a malicious hacker is motivated to create a devastating network worm using security software flaws as the attack vector.
Something new to look out for?
- Hacking Your Fridge – Internet of Things Security
- Important OpenSSL Patch – 6 More Vulnerabilities
- Spotify Hacked – Rolls Out New Android App
- Multiple Bugs In Anti-Virus Software Revealed
- Anti-Spyware Software Wars – Can’t they get along?!
- Email Worm Spreading Like Wildfire – W32.Imsolk/VBMania Variant
Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 226,920 views
- AJAX: Is your application secure enough? - 119,052 views
- eEye Launches 0-Day Exploit Tracker - 85,036 views