Symantec ActiveX control vulnerable to buffer overflow

2003-07-21T00:00:00
ID VU:527228
Type cert
Reporter CERT
Modified 2003-09-30T00:00:00

Description

Overview

There is a buffer overflow in a component of Symantec's web-based Security Check.

Description

Symantec describes Security Check as "a free web-based tool that enables users to test their computer's exposure to a wide range of on-line threats. As part of running the check, users may install an ActiveX Control, which remains on the user's system even after the check has completed." A buffer overflow has been discovered in the ActiveX control that is distributed from Symantec's web-based Security Check web site. For further technical details, please see the following documents:

* [Cesar Cerrudo's advisory](<http://lists.netsys.com/pipermail/full-disclosure/2003-June/010692.html>)
* [Symantec's advisory](<http://www.sarc.com/avcenter/security/Content/2003.06.25.html>)

Impact

Any user that visited Symantec's Security Check web site before June 25, 2003, when Symantec replaced the vulnerable ActiveX control, is likely to have the vulnerable control on their system. The only way to get rid of the control is to either visit Symantec's Security Check web site and run another Security Scan, or manually remove the vulnerable control. Users not following, or unaware of, either of these courses of action may be subject to an attacker installing and/or invoking a vulnerable version of the control on their system.