TITLE: Symantec Products Alert Notification Two Vulnerabilities SECUNIA ADVISORY ID: SA21884
VERIFY ADVISORY: http://secunia.com/advisories/21884/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: Local system SOFTWARE: Symantec Client Security 3.x http://secunia.com/product/6649/ Symantec Client Security 2.x http://secunia.com/product/3478/ Symantec Client Security 1.x http://secunia.com/product/2344/ Symantec AntiVirus Corporate Edition 9.x http://secunia.com/product/3549/ Symantec AntiVirus Corporate Edition 8.x http://secunia.com/product/659/ Symantec AntiVirus Corporate Edition 10.x http://secunia.com/product/5555/ DESCRIPTION: Some vulnerabilities have been reported in Symantec Client Security and Symantec AntiVirus Corporate Edition, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. 1) A format string error within the handling of "Tamper Protection" and "Virus Alert Notification" messages can be exploited to execute arbitrary code with escalated privileges by replacing the message with a specially crafted format string. 2) Another format string error exists in the alert notification process when displaying a notification message upon detection of a malicious file. This can be exploited to crash the Real Time Virus Scan service by replacing the message with a specially crafted format string. SOLUTION: Apply patches (see patch matrix in vendor advisory). ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2006.09.13.html Layered Defense: http://layereddefense.com/SAV13SEPT.html ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
