[NT] Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.

- - - - - - - - -

Symantec Internet Security 2008 ActiveDataInfo.LaunchProcess Design Error


<http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008> Norton Internet Security 2008 is "a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic". Remote exploitation of a design error in an ActiveX control installed with Symantec Norton Internet Security 2008 could allow for the execution of arbitrary code.


Vulnerable Systems:
* Norton Internet Security 2008 version

Norton Internet Security 2008 installs the following ActiveX control which
is registered as safe for scripting:
Progid: SymAData.ActiveDataInfo.1
Clsid: 3451DEDE-631F-421c-8127-FD793AFC6CC8

This control contains functionality designed to allow Symantec to remotely
execute programs on the target machine.

Exploitation allows attackers to execute arbitrary code with the
privileges of the currently logged in user. In order for exploitation to
occur, an attacker would have to lure a vulnerable user to a malicious web

While this control is marked as safe for scripting, the control has been
designed so that it can only be run from the "symantec.com" domain. In
practice this requirement can be bypassed through the use of any Cross
Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation
could also occur through the use of DNS poisoning attacks.

Setting the kill-bit for this control will prevent it from being loaded
within Internet Explorer. However, doing so will prevent legitimate use of
the control.

Vendor response:
Symantec has addressed this vulnerability by releasing updates. For more
information, refer to their advisory at the following URL.

CVE Information:

Disclosure Timeline:
12/14/2007 - Initial vendor notification
12/14/2007 - Initial vendor response
04/02/2008 - Coordinated public disclosure


The information has been provided by iDefense Labs.
The original article can be found at:


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

Relevant Pages