---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Symantec Products Client Proxy ActiveX Control Buffer Overflow SECUNIA ADVISORY ID: SA38651 VERIFY ADVISORY: http://secunia.com/advisories/38651/ DESCRIPTION: A vulnerability has been reported in some Symantec products, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the Symantec Client Proxy ActiveX control (CLIproxy.dll). This can be exploited to cause a buffer overflow e.g. when a user visits a specially crafted web page passing an overly long argument to the "SetRemoteComputerName()" method. Successful exploitation allows execution of arbitrary code. The vulnerability is reported in Symantec AntiVirus 10.0.x, 10.1.x, and 10.2.x and Symantec Client Security 3.0.x and 3.1.x. SOLUTION: -- Symantec AntiVirus -- Symantec AntiVirus 10.0.x: Update to SAV 10.1 MR9. Symantec AntiVirus 10.1.x: Update to MR9. Symantec AntiVirus 10.2.x: Update to MR4. -- Symantec Client Security -- Symantec Client Security 3.0.x: Update to SCS 3.1 MR9. Symantec Client Security 3.1.x: Update to MR9. PROVIDED AND/OR DISCOVERED BY: Alexander Polyakov, Digital Security Research Group CHANGELOG: 2010-02-22: Updated credits and "Description". Added reporter link to the "Original Advisory" section. ORIGINAL ADVISORY: Symantec SYM10-004: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02 Digital Security Research Group: http://dsecrg.com/pages/vul/show.php?id=139 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------