Vigil@nce: Symantec AV, Norton AV, several vulnerabilities
February 2010 by Vigil@nce
Three vulnerabilities of Symantec and Norton products can be used
by an attacker to disable the antivirus or to execute code.
– Severity: 2/4
– Consequences: user access/rights, data flow
– Provenance: document
– Means of attack: no proof of concept, no attack
– Ability of attacker: expert (4/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: high (3/3)
– Number of vulnerabilities in this bulletin: 3
– Creation date: 18/02/2010
IMPACTED PRODUCTS
– Symantec Antivirus
– Symantec Norton AntiVirus
– Symantec Norton Internet Security
DESCRIPTION OF THE VULNERABILITY
Three vulnerabilities were announced in Symantec and Norton
products.
A local attacker can disable the Symantec AntiVirus on-demand
scan. [severity:2/4; BID-38127, CVE-2010-0106, SYM10-002]
An attacker can generate a buffer overflow in the SYMLTCOM.DLL
ActiveX of Norton AV/IS, in order to execute code when the victim
browses a malicious web site. [severity:2/4; BID-38129,
CVE-2010-0107, SYM10-003]
An attacker can generate a buffer overflow in Symantec Client
Proxy (CLIproxy.dll). [severity:1/4; BID-38222, CVE-2010-0108,
DSECRG-09-039, SYM10-004]
CHARACTERISTICS
– Identifiers: BID-38127, BID-38129, BID-38222, CVE-2010-0106,
CVE-2010-0107, CVE-2010-0108, DSECRG-09-039, SYM10-002, SYM10-003,
SYM10-004, VIGILANCE-VUL-9462
– Url: http://vigilance.fr/vulnerability/Symantec-AV-Norton-AV-several-vulnerabilities-9462