Security software company Symantec acknowledged that software flaws in some of its antivirus products could allow malicious hackers to use denial of service (DOS) attacks to crash systems running the software, disrupting automatic protection features.
On Monday, the company posted a notice on its Web page that described two DOS vulnerabilities in the 2004 and 2005 editions of Symantec Norton Antivirus, Norton Internet Security and Norton System Works. The company has patched the holes and distributed software updates to users of the LiveUpdate automatic update service. However, systems that are not patched could be susceptible to remote attack through e-mail or the Web, Symantec said.
The holes were discovered by security researchers in Japan. In one case, the Information-Technology Promotion Agency-Japan (IPA) discovered a problem on systems running Norton Antivirus 2005 with the Auto-Protect and SmartScan features enabled. Auto-Protect is a feature that scans files sent from the Internet, removable disks or e-mail attachments and looks for viruses, Trojan horse programs and other malicious code. SmartScan allows Norton Antivirus to quickly scan specific types of files often associated with malicious code, such as EXE and DOC files.
With SmartScan enabled, researchers at IPA found that renaming a file on a shared network folder can cause the system running Norton Antivirus to crash.
In a second issue reported by the Japan Computer Emergency Response Team (JPCERT), machines running Norton AntiVirus 2004 and 2005 crashed when Auto-Protect scanned a specific type of file that Symantec declined to identify.
Symantec rated the two holes "low" risks and said the company is unaware of any adverse customer impact from the vulnerabilities. Still, customers were advised to run LiveUpdate for any affected products until all available product updates are downloaded and installed. (See: http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html.)
The news comes amid numerous reports of flaws in antivirus products, which many Internet users rely on as protection against hackers, worms and viruses.
In February, Symantec issued patches to fix a high-impact hole that affected almost its entire product line. The hole, which was discovered by Internet Security Systems (ISS) affected the DEC2EXE module in the Symantec Anti-Virus Library, a part of the company's virus detection engine. The vulnerability could allow a remote attacker to use vulnerable Symantec products to get unauthorized access to a network or its client PCs, ISS warned.
On March 17, ISS issued another warning about a remotely exploitable hole in antivirus technology from Symantec's chief competitor, McAfee. In that case, ISS said a stack-based buffer overflow affecting nearly all versions of VirusScan could be used exploited by remote attackers without requiring them to log in to affected systems to launch an attack.