[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 377/03 - Symantec - ActiveX Buffer Overflow



 
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------------
   UNIRAS (UK Govt CERT) Briefing Notice - 377/03 dated 01.07.03  Time: 09:20
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====

Symantec Security Advisory:

ActiveX Buffer Overflow

Detail
====== 

- - -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title:    Symantec Security Check ActiveX Buffer Overflow

Date:     Monday, June 23, 2003 09:15:19 PM
Threat:   Moderate
Impact:   System Access 
Product:  Symantec Security Check

Situation Overview:
Symantec Security Check is a free web-based tool that enables users
to test their computer's exposure to a wide range of on-line threats.
As part of running the check, users may install an ActiveX Control
which remains on the user's system even after the check has
completed.

The current ActiveX Control - which can be named Symantec RuFSI
Utility Class or Symantec RuFSI Registry Information Class - contains
a buffer overflow exploit. The buffer overflow can be exploited when
the user with this ActiveX Control visits a malicious website intent
on exploiting this vulnerability. The exploit can cause Internet
Explorer to crash and/or the execution of arbitrary code on the
user's computer.

Symantec has replaced the current ActiveX Control on the Symantec
Security Check website so that new visitors will not be affected by
the exploit.

Recent visitors to Symantec Security Check should revisit the site
and run a new Security Scan. By running a new scan, the previous
ActiveX Control will be replaced by an updated ActiveX Control that
fixes the buffer overflow condition.

Advanced users can attempt to delete the ActiveX Control by rebooting
and then going into the system folder: %SystemRoot%\Downloaded
Program Files\ and delete "rufsi.dll". This must be done by using the
command prompt and the user must not be on the Symantec Security
Check site at the time.

Statement:
Symantec was made aware of Symantec Security Check's ActiveX buffer
overflow vulnerability today through a public posting on the
Internet. Since hearing of the exploit Symantec has worked diligently
to replace the ActiveX Control on Symantec Security Check. Through
Symantec's customer support, we are working with users who may have
downloaded the exploited ActiveX Control to remove it from their
systems. Although Symantec Security Check is available to both PC and
Mac users, this issue only affects PCs.

Symantec Vulnerability Response Process:
Symantec is a strong supporter of responsible disclosure. It is our
goal to establish a working relationship with researchers who
discover vulnerabilities in Symantec products and to develop, test
and make available updates prior to there being publicly disclosed.
It is ours as well as much of the security communities belief that
premature disclosure can pose a serious threat to the internet. Such
disclosure should be discouraged.

Symantec Security

- - -----BEGIN PGP SIGNATURE-----
Version: PGP 7.0

iQA/AwUBPviB3hMwEkwA14VxEQJ7WgCdHlF3E6/id/tJc0EJBejLq75E2QMAoJIY
Xl3JfZOIT/LXoB8GnqznO3iS
=j4U8
- - -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via EMail to:
uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Symantec for the information
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQCVAwUBPwFFkIpao72zK539AQGbSgP+KiKWa7LP23ywR/m0elXDhRICALQGeVAB
nb7IqtcOkrxn1Lkz/eX+JBR19G6/HyhCecBFioeVh5xMjwEr24LqWrXP9sw3gY2B
SYIiabG2qOV/SpwDJTIIhM0+YCBG/aHYwFwQQDtkaAKRyVMHEeWYbnDrMLkyyOgM
/FJMxpmlqb8=
=KCEa
-----END PGP SIGNATURE-----