Great Symantec has three new vulnerabilities that have been discovered. The vulns could potentially allow a remote attacker to access into the engine and conduct a man-in-the-middle attack.

1.) The Symantec Scan Engine fails to properly authenticate web-based user logins. Anyone with knowledge of the underlying communication mechanism can control the Scan Engine server.

2.) Symantec Scan Engine uses a static private DSA key for SSL communications. This key cannot be changed by end users and is easily extracted. This opens the product to a potential man-in-the-middle attack.

3.) There is a vulnerability in Symantec Scan Engine that allows unauthenticated remote users to download any file located under the Symantec Scan Engine installation directory. For instance, the configuration file, the scanning logs, and the current virus definitions can all be accessed by any remote user using regular or specially crafted HTTP requests.

SANS ISC
Symantec Advisory

[tags]Security, Virus, Vulnerability[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.