• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Symantec Enterprise Software Has a Big Security Hole

    May 30, 2006 Timothy Prickett Morgan

    We don’t normally worry too much about what is going on with the security of Windows desktops–well, at least not editorially in this newsletter. But as users of Windows desktops and laptops, as most of you are, we get a little concerned about security holes and the potential havoc they can wreak in the data center and on the desktops.

    With that in mind, we just wanted you to be aware that Symantec has issued a statement that there is a stack overflow vulnerability in its Symantec Client Security 3.1 and Symantec AntiVirus Corporate Edition 10.1 software. The vulnerability is such that it can allow someone local or remote to potentially take over the machine and execute code on your machine. The hole does not require a hacker to authenticate on your machine or for you to do anything at all, so it is a good thing that there is not an exploit available for this security hole. Basically, the antivirus portion of the program is an open door right now as I write this. Apparently, the low-end desktop products do not have this vulnerability, which is a bit peculiar.

    eEye Security, a security software firm that sells complimentary products for managing network security, put out a statement on May 24 saying it had discovered the vulnerability. On May 25, Symantec’s software engineers verified that this vulnerability exists and released a statement itself. Symantec has released intrusion detection system (IDS) signatures to help security officers detect when this vulnerability is being exploited, and further advises everyone to be careful opening attachments and surfing the Web, since code can just run if it sniffs you out. Symantec is working on a patch for this hole. The tricky bit is that as soon as a patch is released, hackers will be able to craft an exploit instantly. So keep your Symantec software up to date.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 22 -- May 30, 2006

    Sponsored by
    Maxava

    Maxava Partner Webinar: IBM i on Power11: Migration Paths and Right-Sizing

    In this webinar, experts from ATS Group and Maxava will outline what these changes mean for your environment and provide a clear roadmap for planning and executing a Power11 migration.

    Register Now

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Setting Up Unattended i5 Server IPLs The Inside Stories of the Innovation Award Winners

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 22

This Issue Sponsored By

    Table of Contents

    • IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning
    • IBM Names Eight New IBM Fellows, But Forgets One
    • DataMirror’s Sales Decline in Its Fiscal First Quarter
    • Outsourcing, Offshoring on the Rise in North America, Evans Data Survey Says
    • Database Sales Grew in 2005, Say IDC and Gartner
    • IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning
    • Symantec Enterprise Software Has a Big Security Hole
    • As I See It: Net Reality
    • Business Continuity Planning Part 2: Disaster Without Warning
    • IBM to Buy SAP? Why Not?

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Power Systems Grows Nicely In Q3, Looks To Grow For All 2025, Too
    • Beta Of MCP Server Opens Up IBM i For Agentic AI
    • Sundry IBM i And Power Stack Announcements For Your Consideration
    • Please Take The IBM i Marketplace Survey
    • IBM i PTF Guide, Volume 27, Number 43
    • IBM Pulls The Curtain Back A Smidge On Project Bob
    • IBM Just Killed Merlin. Here’s Why
    • Guru: Playing Sounds From An RPG Program
    • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
    • IBM i PTF Guide, Volume 27, Number 42

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle