[NT] Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error Vulnerability
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 8 Apr 2008 15:19:18 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error
<http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008> Norton Internet Security 2008 is "a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic". Remote exploitation of a design error in an ActiveX control installed with Symantec Norton Internet Security 2008 could allow for the execution of arbitrary code.
* Norton Internet Security 2008 version 126.96.36.199
Norton Internet Security 2008 installs the following ActiveX control which
is registered as safe for scripting:
This control contains functionality designed to allow Symantec to remotely
execute programs on the target machine.
Exploitation allows attackers to execute arbitrary code with the
privileges of the currently logged in user. In order for exploitation to
occur, an attacker would have to lure a vulnerable user to a malicious web
While this control is marked as safe for scripting, the control has been
designed so that it can only be run from the "symantec.com" domain. In
practice this requirement can be bypassed through the use of any Cross
Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation
could also occur through the use of DNS poisoning attacks.
Setting the kill-bit for this control will prevent it from being loaded
within Internet Explorer. However, doing so will prevent legitimate use of
Symantec has addressed this vulnerability by releasing updates. For more
information, refer to their advisory at the following URL.
12/14/2007 - Initial vendor notification
12/14/2007 - Initial vendor response
04/02/2008 - Coordinated public disclosure
The information has been provided by iDefense Labs.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability
- Next by Date: [NT] Apple QuickTime Multiple Vulnerabilities
- Previous by thread: [NT] Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability
- Next by thread: [NT] Apple QuickTime Multiple Vulnerabilities