The flaw could be exploited by simply sending a malicious email or tricking users to visit a link The antivirus engine used in multiple Symantec products has an easy-to-exploit vulnerability that could allow hackers to easily compromise computers. The flaw was fixed by Symantec in Anti-Virus Engine (AVE) version 20151.1.1.4, released Monday via LiveUpdate. The flaw consists of a buffer overflow condition that could be triggered when parsing executable files with malformed headers. According to Google security engineer Tavis Ormandy, who found the flaw, the vulnerability can be exploited remotely to execute malicious code on computers. All it takes is for the attacker to send an email with the exploit file as attachment or to convince the user to visit a malicious link. Executing the file is not necessary, because the antivirus engine uses a driver to intercept all system input and output operations and will automatically scan the file as soon as it reaches the file system in any way. The file extension doesn’t matter, as long as the file has a header identifying it as a portable executable file packed with ASPack, a commercial compressor utility. The worst part about it is that the Symantec AVE unpacks such files inside the kernel, the highest privileged region of the OS. This means that successful exploitation can lead to a full system compromise. “On Linux, Mac and other UNIX platforms, this results in a remote heap overflow as root in the Symantec or Norton process,” Ormandy said in an advisory. “On Windows, this results in kernel memory corruption, as the scan engine is loaded into the kernel, making this a remote ring0 memory corruption vulnerability — this is about as bad as it can possibly get.” Symantec has rated the vulnerability with a 9.1 severity score out of 10 in the Common Vulnerability Scoring System (CVSS). “The most common symptom of a successful attack would result in an immediate system crash, aka. Blue Screen of Death (BSOD),” the company said in its own advisory. Users should make sure that they install the latest available updates available for their Symantec antivirus products and can check the version of the AVE using instructions on Symantec’s support website. This is the latest in a long string of critical vulnerabilities found by Ormandy and other security researchers in antivirus products in recent years. Most of them have criticized antivirus vendors for continuing to perform dangerous file scanning operations, which historically have resulted in vulnerabilities, using kernel privileges. Related content analysis Network automation challenges are dampening success rates Most enterprises are juggling multiple commercial, open source, and homegrown network automation tools, and few are reporting fully successful automation initiatives. By Denise Dubie Mar 28, 2024 6 mins Data Center Automation Network Management Software Network Monitoring news SD-WAN, SASE outpace MPLS investments: survey SD-WAN and SASE technologies are becoming mainstream and MPLS usage is on the decline, according to survey results from SASE vendor Aryaka. By Denise Dubie Mar 28, 2024 4 mins SASE MPLS Network Management Software analysis Beware the gap between security readiness and confidence levels, Cisco warns Companies need greater network segmentation, sandboxes, firewalls, and anomaly detection to fight attackers, according to Cisco's 2024 Cybersecurity Readiness Index. By Michael Cooney Mar 27, 2024 6 mins SASE Network Security Networking analysis Cisco: AI tools, better workspaces would boost in-office appeal Office environments need to change to foster collaboration, and employers need to close the AI skills gap, Cisco reports in its hybrid work study. By Michael Cooney Mar 27, 2024 3 mins Generative AI Careers Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe