Secunia Security Advisory - A vulnerability has been reported in some Symantec products, which can be exploited by malicious people to compromise a user's system.
dea4a8c9897c2e5a2dbce31e71e7f3894de07f6ad114771acc97d6e2b3e2a5fa
----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA
http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
----------------------------------------------------------------------
TITLE:
Symantec Products Client Proxy ActiveX Control Buffer Overflow
SECUNIA ADVISORY ID:
SA38651
VERIFY ADVISORY:
http://secunia.com/advisories/38651/
DESCRIPTION:
A vulnerability has been reported in some Symantec products, which
can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the Symantec
Client Proxy ActiveX control (CLIproxy.dll). This can be exploited
to cause a buffer overflow e.g. when a user visits a specially
crafted web page passing an overly long argument to the
"SetRemoteComputerName()" method.
Successful exploitation allows execution of arbitrary code.
The vulnerability is reported in Symantec AntiVirus 10.0.x, 10.1.x,
and 10.2.x and Symantec Client Security 3.0.x and 3.1.x.
SOLUTION:
-- Symantec AntiVirus --
Symantec AntiVirus 10.0.x:
Update to SAV 10.1 MR9.
Symantec AntiVirus 10.1.x:
Update to MR9.
Symantec AntiVirus 10.2.x:
Update to MR4.
-- Symantec Client Security --
Symantec Client Security 3.0.x:
Update to SCS 3.1 MR9.
Symantec Client Security 3.1.x:
Update to MR9.
PROVIDED AND/OR DISCOVERED BY:
Alexander Polyakov, Digital Security Research Group
CHANGELOG:
2010-02-22: Updated credits and "Description". Added reporter link to
the "Original Advisory" section.
ORIGINAL ADVISORY:
Symantec SYM10-004:
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02
Digital Security Research Group:
http://dsecrg.com/pages/vul/show.php?id=139
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------