|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Symantec AVE: memory corruption via PE Header
Synthesis of the vulnerability
An attacker can generate a memory corruption via a PE Header on Symantec AVE, in order to trigger a denial of service, and possibly to run code with system privileges.
Impacted software: Norton Antivirus, Norton Internet Security, Norton Security, Symantec AV, SEP.
Severity of this computer vulnerability: 4/4.
Consequences of an attack: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service.
Attacker's origin: document.
Creation date: 17/05/2016.
Références of this announce: 820, BID-90653, CVE-2016-2208, SYM16-008, VIGILANCE-VUL-19636.
Description of the vulnerability
The Symantec AVE engine analyzes executable in PE format.
However, a malformed PE header corrupts the memory of a kernel driver.
An attacker can therefore generate a memory corruption via a PE Header on Symantec AVE, in order to trigger a denial of service, and possibly to run code with system privileges.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a computers vulnerabilities bulletin. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.