[<prev] [next>] [day] [month] [year] [list]
Message-ID: <OF022F9C5F.448238F0-ON86256DCD.006C4264-86256DCD.006C501C@symantec.com>
Date: Tue, 28 Oct 2003 13:43:03 -0600
From: Sym Security <symsecurity@...antec.com>
To: bugtraq@...urityfocus.com
Subject: RE: Norton Internet Security Blocked Sites XSS
On 27 Oct, 2003 Digital Pranksters posted the following:
To: bugtraq@...urityfocus.com
Subject: Norton Internet Security 2003 XSS
Date: Oct 27 2003 7:26PM
Message-ID: <Pine.LNX.4.44.0310271323470.9099-100000@...l>
DigitalPranksters Security Advisory
http://www.DigitalPranksters.com
Norton Internet Security Blocked Sites XSS
Risk: Low
Product: Norton Internet Security 2003 v6.0.4.34 (Maybe others we only
tested this version)
-----------------snip-------------
27 October 2003
Symantec Network Internet Security (NIS) Blocked Site Return Messages Not
Properly Validated
Risk
Low
Overview
A security group, The Digital Pranksters, reported an issue they
discovered in Symantec's Norton Internet Security product.
The URL in the return message from a site on the blocked list in the
Norton Parental Control feature can allow an unauthorized
script to run the client system.
Components Affected
Symantec's Norton Internet Security 2003
Symantec's Norton Internet Security 2004
Description
Symantec's Norton Internet Security blocks inappropriate web content to
help parents keep their children safe from
inappropriate material while online. The Norton Parental Control blocks
access to newsgroups and Web sites that may not be
suitable for children. When a link is accessed or followed to one of the
sites on the blocked list, Norton Internet Security
returns a message stating that the site is restricted and has been
blocked. The returned message included the URL of the
restricted site and is presented in a separate browser window Norton
Internet Security opens on the client system. Digital
Pranksters reported that they were able to supply a URL from a blocked
site that contained additional unauthorized script
embedded in the URL. This script displayed in the blocked access message
window on the client system.
Symantec Response
Symantec has verified this issue. There is a bug in the way Norton
Internet Security is validating the content it returns in
the informational page. This is being fixed and will be forthcoming in a
future LiveUpdate to Norton Internet Security
products.
The risk presented by this bug is very low to non-existent. Any
unauthorized script returned in the blocked site URL runs in
the context of the informational window that Norton Internet Security
opens on the client system. This is a very restricted
environment providing no access to the client system outside of the
display window or any unauthorized information from the
client system to be sent out. While it presents little risk to the client
system, it is unwarranted action that is being
addressed.
Symantec takes any potential security issues with Symantec products very
seriously. While the issue described by the Digital
Pranksters applies only to the subset of Web sites contained in the Norton
Internet Security Block Site list, there are many
other malicious Web sites on the Internet and many ways of enticing a
careless surfer to visit such a site. Symantec recommends
the following best practices as part of a normal security posture:
* Keep vendor-supplied security patches and updates for all application
software and operating systems current.
* Run current Anti-Virus/Firewall applications and keep the definitions
updated. Systems should be scanned on a regular basis.
* Be wary of attachments delivered via email. Especially ones with vbs,
.bat, .exe, .pif and .scr file extensions that are
commonly used to spread viruses, worms, and trojans.
* Even if the sender is known, users should be wary of attachments or
unknown files if the sender does not thoroughly explain
the content in the body of the email. The source of the original
attachment is often unknown.
* If in doubt, users should contact the sender before opening the
attachment or downloading the file to see if, in fact, they
did intend to send it. If there is still doubt, users should delete the
document in question without opening it.
* If you intend to download an attachment, download to a separate folder
and scan prior to opening.
* Practice safe surfing.
Credit
Symantec takes the security and proper functionality of our products very
seriously. Symantec appreciates the coordination of
Digital Pranksters security team in identifying and providing details of
this area of concern as well as working closely with
Symantec to properly address the issue. Anyone with information on
security issues or concerns with Symantec products should
contact symsecurity@...antec.com
Copyright (c) 2003 by Symantec Corp.
Permission to redistribute this alert electronically is granted as long as
it is not edited in any way unless authorized by
Symantec Security Response. Reprinting the whole or parts of this alert in
any medium other than electronically requires
permission from symsecurity@...antec.com.
Disclaimer
The information in the advisory is believed to be accurate at the time of
publishing based on currently available information.
Use of the information constitutes acceptance for use in an AS IS
condition. There are no warranties with regard to this
information. Neither the author nor the publisher accepts any liability
for any direct, indirect, or consequential loss or
damage arising from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response, and SymSecurity
are registered trademarks of Symantec Corp. and/or
affiliated companies in the United States and other countries. All other
registered and unregistered trademarks represented in
this document are the sole property of their respective companies/owners.
Symantec Security Response
symsecurity@...antec.com
http://securityresponse.symantec.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1
iQA/AwUBO7iRFxMwEkwA14VxEQKI8gCfWICJV9DrP5YPrcJa9dxgtSCHaaIAn3e+
WKp8AolyJgWU0eeQKBtc7tu3
=f7Si
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists