CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
April 2nd, 2008

Symantec ActiveX Control Remote Share Vulnerability

An ActiveX control in the Symantec AutoFix Tool is prone to a vulnerability due to an insecure method.

Attackers can leverage this issue to load an arbitrary file onto a victim’s computer and then execute it with the privileges of the application running the control (usually Internet Explorer). This issue is exploitable only when a victim’s computer is configured to allow remote connections to WebDav or SMB shares.

Successful exploits will compromise affected computers and allow attackers control over the machine.

This issue affects ‘SYMADATA.DLL’ version 2.7.0.1 ActiveX control, which is part of the following Symantec products:

Symantec Norton SystemWorks 2008

Symantec Norton SystemWorks 2007

Symantec Norton SystemWorks 2006

Symantec Norton Internet Security 2008

Symantec Norton Internet Security 2007

Symantec Norton Internet Security 2006

Symantec Norton Antivirus 2008

Symantec Norton Antivirus 2007

Symantec Norton AntiVirus 2006

Symantec Norton 360 1.0

Symantec released an advisory and fixes to address this issue. Users of affected packages can use the interactive LiveUpdate feature to obtain and apply fixes or visit https://www-secure.symantec.com/techsupp/asa/install.jsp

References:
Microsoft Knowledge Base article 240797
Norton Product Page
SYM08-009 Symantec AutoFix Support Tool ActiveX Control Vulnerabilities

Currently we are not aware of any working exploits. If you know of any or if you are aware of more recent information, please comment.

Email, Bookmark or Share:
  • E-mail this story to a friend!
  • Digg
  • del.icio.us
  • StumbleUpon
  • Reddit
  • Technorati
  • Slashdot
  • Propeller
  • Google
  • Live
  • YahooMyWeb
  • TwitThis
  • Facebook
  • LinkedIn

More on CyberInsecure:
  • Remote Code Execution Vulnerability In The ActiveX Control For The Microsoft Access Snapshot Viewer Added Into Neosploit
  • Microsoft Office Snapshot Viewer ActiveX Control Vulnerability
  • CA BrightStor Users Under Attack
  • RealPlayer Vulnerability Exploited In The Wild
  • Exploit Targeting Corporate Computer Associates Users

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Symantec ActiveX Control Remote Share Vulnerability

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.