Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

mpainesyd

macrumors 6502a
Original poster
Nov 29, 2008
689
168
Sydney, Australia
I just came across this US-CERT alert:
https://www.us-cert.gov/ncas/alerts/TA16-187A

Original release date: July 05, 2016
Overview
Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system.

...
A heap overflow vulnerability in the ASPack unpacker could allow an unauthenticated remote attacker to gain root privileges on Linux or OSX platforms. The vulnerability can be triggered remotely using a malicious file (via email or link) with no user interaction.
---------
How ironic!

This does not seem to have been picked up by Mac news websites.
 
6/28/16 blog entry by Tavis Ormandy regarding Symantec/Norton :

.....These vulnerabilities are as bad as it gets. They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption.


As Symantec use the same core engine across their entire product line, all Symantec and Norton branded antivirus products are affected by these vulnerabilities, including:
  • Norton Security, Norton 360, and other legacy Norton products (All Platforms)
  • Symantec Endpoint Protection (All Versions, All Platforms)
  • Symantec Email Security (All Platforms)
  • Symantec Protection Engine (All Platforms)
  • Symantec Protection for SharePoint Servers
  • And so on.
.....
https://googleprojectzero.blogspot.com/2016/06/how-to-compromise-enterprise-endpoint.html
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.