Symantec Patches AV Flaw In Five Days

A stack overflow in the Cupertino, Calif. security company's Client Security 3.0 and 3.1, and its AntiVirus Corporate Edition 10.0 and 10.1, have been fully patched.

May 30, 2006

1 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Symantec finished patching its buggy anti-virus line Sunday, just days after another security vendor said that machines running Symantec's enterprise products could be easily hijacked.

A stack overflow in the Cupertino, Calif. security company's Client Security 3.0 and 3.1, and its AntiVirus Corporate Edition 10.0 and 10.1, were fully patched as of Sunday, according to an updated advisory on Symantec's Web site. The fixes must be downloaded and installed manually.

Early Friday, Symantec confirmed that the two corporate anti-virus titles were flawed, and said it was working on a fix. Later that day, the company posted signature updates to its intrusion prevention system (IPS) appliances to protect those customers with the hardware on their networks.

The bug was discovered by Aliso Viejo, Calif.-based eEye Digital Security, which on Wednesday disclosed the vulnerability. eEye rated it as a "high" threat because it could be exploited by a worm that didn't require any user interaction.

As expected, Symantec's patch job was remarkably quick. Last week, eEye Digital spokesman Mike Puterbaugh said he was counting on Symantec to fix the flaw fast. "Symantec will fix this fairly quickly," said Puterbaugh. "Certainly a lot faster than the 140+ day average it takes Microsoft to fix a vulnerability."Symantec's consumer-grade anti-virus family, which is sold under the Norton nameplate, was not vulnerable to the bug.

Read more about:

2006
SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights