TUCoPS :: Security App Flaws :: bt475.txt

Symantec Security Check ActiveX Buffer Overflow


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title:    Symantec Security Check ActiveX Buffer Overflow

Date:     Monday, June 23, 2003 09:15:19 PM
Threat:   Moderate
Impact:   System Access 
Product:  Symantec Security Check

Situation Overview:
Symantec Security Check is a free web-based tool that enables users
to test their computer's exposure to a wide range of on-line threats.
As part of running the check, users may install an ActiveX Control
which remains on the user's system even after the check has
completed.

The current ActiveX Control - which can be named Symantec RuFSI
Utility Class or Symantec RuFSI Registry Information Class - contains
a buffer overflow exploit. The buffer overflow can be exploited when
the user with this ActiveX Control visits a malicious website intent
on exploiting this vulnerability. The exploit can cause Internet
Explorer to crash and/or the execution of arbitrary code on the
user's computer.

Symantec has replaced the current ActiveX Control on the Symantec
Security Check website so that new visitors will not be affected by
the exploit.

Recent visitors to Symantec Security Check should revisit the site
and run a new Security Scan. By running a new scan, the previous
ActiveX Control will be replaced by an updated ActiveX Control that
fixes the buffer overflow condition.

Advanced users can attempt to delete the ActiveX Control by rebooting
and then going into the system folder: %SystemRoot%\Downloaded
Program Files\ and delete "rufsi.dll". This must be done by using the
command prompt and the user must not be on the Symantec Security
Check site at the time.

Statement:
Symantec was made aware of Symantec Security Check's ActiveX buffer
overflow vulnerability today through a public posting on the
Internet. Since hearing of the exploit Symantec has worked diligently
to replace the ActiveX Control on Symantec Security Check. Through
Symantec's customer support, we are working with users who may have
downloaded the exploited ActiveX Control to remove it from their
systems. Although Symantec Security Check is available to both PC and
Mac users, this issue only affects PCs.

Symantec Vulnerability Response Process:
Symantec is a strong supporter of responsible disclosure. It is our
goal to establish a working relationship with researchers who
discover vulnerabilities in Symantec products and to develop, test
and make available updates prior to there being publicly disclosed.
It is ours as well as much of the security communities belief that
premature disclosure can pose a serious threat to the internet. Such
disclosure should be discouraged.

Symantec Security

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBPviB3hMwEkwA14VxEQJ7WgCdHlF3E6/id/tJc0EJBejLq75E2QMAoJIY
Xl3JfZOIT/LXoB8GnqznO3iS
=j4U8
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH