home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 314 of 523   
   Ben Ritchey to All   
   US-Cert Alert   
   05 Jul 16 12:50:04   
   
   U.S. Department of Homeland Security US-CERT   
      
   National Cyber Awareness System:   
      
      
      
   TA16-187A: Symantec and Norton Security Products Contain Critical    
   Vulnerabilities   
   07/05/2016 10:50 AM EDT   
      
      
   Original release date: July 05, 2016   
      
   Systems Affected   
   All Symantec and Norton branded antivirus products   
      
   Overview   
   Symantec and Norton branded antivirus products contain multiple    
   vulnerabilities. Some of these products are in widespread use throughout    
   government and industry. Exploitation of these vulnerabilities could allow a    
   remote attacker to take control of an affected system.   
      
   Description   
   The vulnerabilities are listed below:   
      
   CVE-2016-2207   
      
   Symantec Antivirus multiple remote memory corruption unpacking RAR [1]   
      
   CVE-2016-2208   
      
   Symantec antivirus products use common unpackers to extract malware binaries    
   when scanning a system. A heap overflow vulnerability in the ASPack unpacker    
   could allow an unauthenticated remote attacker to gain root privileges on   
   Linux    
   or OSX platforms. The vulnerability can be triggered remotely using a   
   malicious    
   file (via email or link) with no user interaction. [2]   
   CVE-2016-2209   
      
   Symantec: PowerPoint misaligned stream-cache remote stack buffer overflow [3]   
   CVE-2016-2210   
      
   Symantec: Remote Stack Buffer Overflow in dec2lha library [4]   
   CVE-2016-2211   
      
   Symantec: Symantec Antivirus multiple remote memory corruption unpacking   
   MSPACK    
   Archives [5]   
   CVE-2016-3644   
      
   Symantec: Heap overflow modifying MIME messages [6]   
   CVE-2016-3645   
      
   Symantec: Integer Overflow in TNEF decoder [7]   
   CVE-2016 -3646   
      
   Symantec: missing bounds checks in dec2zip ALPkOldFormatDecompressor::UnShrink    
   [8]   
      
      
   Impact   
   The large number of products affected (24 products), across multiple platforms    
   (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote    
   code execution at root or SYSTEM privilege) make this a very serious event. A    
   remote, unauthenticated attacker may be able to run arbitrary code at root or    
   SYSTEM privileges by taking advantage of these vulnerabilities. Some of the    
   vulnerabilities require no user interaction and are network-aware, which could    
   result in a wormable-event.   
      
   Solution   
   Symantec has provided patches or hotfixes to these vulnerabilities in their    
   SYM16-008 [9] and SYM16-010 [10] security advisories.   
      
   US-CERT encourages users and network administrators to patch Symantec or   
   Norton    
   antivirus products immediately. While there has been no evidence of    
   exploitation, the ease of attack, widespread nature of the products, and    
   severity of the exploit may make this vulnerability a popular target.   
      
   References   
   [1] Symantec Antivirus multiple remote memory corruption unpacking RAR   
   [2] How to Compromise the Enterprise Endpoint   
   [3] Symantec: PowerPoint misaligned stream-cache remote stack buffer overflow   
   [4] Symantec: Remote Stack Buffer Overflow in dec2lha library   
   [5] Symantec: Symantec Antivirus multiple remote memory corruption unpacking    
   MSPACK Archives   
   [6] Symantec: Heap overflow modifying MIME messages   
   [7] Symantec: Integer Overflow in TNEF decoder   
   [8] Symantec: missing bounds checks in dec2zip    
   ALPkOldFormatDecompressor::UnShrink   
   [9] Symantec SYM16-008 security advisory   
   [10] Symantec SYM16-010 security advisory   
   Revision History   
   July 5, 2016: Initial Release   
      
   ----------------------------------------------------------------   
   --------------    
   -   
      
   This product is provided subject to this Notification and this Privacy & Use    
   policy.   
      
      
   ----------------------------------------------------------------   
   --------------    
   -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or    
   have questions, please send an email to info@us-cert.gov. Do not reply to this    
   message since this email was sent from a notification-only address that is not    
   monitored. To ensure you receive future US-CERT products, please add    
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   --------------    
   -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of:    
   United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW    
   Bldg 410 · Washington, DC 20598 · (888) 282-0870  Powered by GovDelivery   
   === Cut ===   
      
      
   -+-   
   Keep the faith   :^)   
      
      Ben  aka cMech  Web: http|ftp|binkp|telnet://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC v1.1.5 via Mystic BBS   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca