lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <OF1E6BC23E.1E3EF540-ON88256D4F.005E0C2F-87256D4F.005EE98F@symantec.com>
Date: Tue, 24 Jun 2003 11:08:39 -0600
From: "Sym Security" <symsecurity@...antec.com>
To: bugtraq@...urityfocus.com
Subject: [Symantec Security Advisor] Symantec Security Check ActiveX Buffer Overflow


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title:    Symantec Security Check ActiveX Buffer Overflow

Date:     Monday, June 23, 2003 09:15:19 PM
Threat:   Moderate
Impact:   System Access 
Product:  Symantec Security Check

Situation Overview:
Symantec Security Check is a free web-based tool that enables users
to test their computer's exposure to a wide range of on-line threats.
As part of running the check, users may install an ActiveX Control
which remains on the user's system even after the check has
completed.

The current ActiveX Control - which can be named Symantec RuFSI
Utility Class or Symantec RuFSI Registry Information Class - contains
a buffer overflow exploit. The buffer overflow can be exploited when
the user with this ActiveX Control visits a malicious website intent
on exploiting this vulnerability. The exploit can cause Internet
Explorer to crash and/or the execution of arbitrary code on the
user's computer.

Symantec has replaced the current ActiveX Control on the Symantec
Security Check website so that new visitors will not be affected by
the exploit.

Recent visitors to Symantec Security Check should revisit the site
and run a new Security Scan. By running a new scan, the previous
ActiveX Control will be replaced by an updated ActiveX Control that
fixes the buffer overflow condition.

Advanced users can attempt to delete the ActiveX Control by rebooting
and then going into the system folder: %SystemRoot%\Downloaded
Program Files\ and delete "rufsi.dll". This must be done by using the
command prompt and the user must not be on the Symantec Security
Check site at the time.

Statement:
Symantec was made aware of Symantec Security Check's ActiveX buffer
overflow vulnerability today through a public posting on the
Internet. Since hearing of the exploit Symantec has worked diligently
to replace the ActiveX Control on Symantec Security Check. Through
Symantec's customer support, we are working with users who may have
downloaded the exploited ActiveX Control to remove it from their
systems. Although Symantec Security Check is available to both PC and
Mac users, this issue only affects PCs.

Symantec Vulnerability Response Process:
Symantec is a strong supporter of responsible disclosure. It is our
goal to establish a working relationship with researchers who
discover vulnerabilities in Symantec products and to develop, test
and make available updates prior to there being publicly disclosed.
It is ours as well as much of the security communities belief that
premature disclosure can pose a serious threat to the internet. Such
disclosure should be discouraged.

Symantec Security

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBPviB3hMwEkwA14VxEQJ7WgCdHlF3E6/id/tJc0EJBejLq75E2QMAoJIY
Xl3JfZOIT/LXoB8GnqznO3iS
=j4U8
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ