• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Symantec Enterprise Software Has a Big Security Hole

    May 30, 2006 Timothy Prickett Morgan

    We don’t normally worry too much about what is going on with the security of Windows desktops–well, at least not editorially in this newsletter. But as users of Windows desktops and laptops, as most of you are, we get a little concerned about security holes and the potential havoc they can wreak in the data center and on the desktops.

    With that in mind, we just wanted you to be aware that Symantec has issued a statement that there is a stack overflow vulnerability in its Symantec Client Security 3.1 and Symantec AntiVirus Corporate Edition 10.1 software. The vulnerability is such that it can allow someone local or remote to potentially take over the machine and execute code on your machine. The hole does not require a hacker to authenticate on your machine or for you to do anything at all, so it is a good thing that there is not an exploit available for this security hole. Basically, the antivirus portion of the program is an open door right now as I write this. Apparently, the low-end desktop products do not have this vulnerability, which is a bit peculiar.

    eEye Security, a security software firm that sells complimentary products for managing network security, put out a statement on May 24 saying it had discovered the vulnerability. On May 25, Symantec’s software engineers verified that this vulnerability exists and released a statement itself. Symantec has released intrusion detection system (IDS) signatures to help security officers detect when this vulnerability is being exploited, and further advises everyone to be careful opening attachments and surfing the Web, since code can just run if it sniffs you out. Symantec is working on a patch for this hole. The tricky bit is that as soon as a patch is released, hackers will be able to craft an exploit instantly. So keep your Symantec software up to date.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 15, Number 22 -- May 30, 2006

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    As I See It: Net Reality IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning

    Leave a Reply Cancel reply

TFH Volume: 15 Issue: 22

This Issue Sponsored By

    Table of Contents

    • IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning
    • IBM Names Eight New IBM Fellows, But Forgets One
    • DataMirror’s Sales Decline in Its Fiscal First Quarter
    • Outsourcing, Offshoring on the Rise in North America, Evans Data Survey Says
    • Database Sales Grew in 2005, Say IDC and Gartner
    • IBM Buys Rembo for Bare-Metal Server and Desktop Provisioning
    • Symantec Enterprise Software Has a Big Security Hole
    • As I See It: Net Reality
    • Business Continuity Planning Part 2: Disaster Without Warning
    • IBM to Buy SAP? Why Not?

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Bob 1.0 Users Bugged By Lack Of One Feature
    • Here Come The AI-Based Code Modernization Offerings
    • Guru: Cohesion First – What A Procedure Should Be Responsible For
    • IBM Offers Trade-Ins On Storage To Grease The Upgrade Skids
    • IBM i PTF Guide, Volume 28, Number 14
    • What IBM i Ideas Are Cooking In IBM’s Ideas Portal?
    • Early Bob Excels In Medhost IBM i Tryout
    • Counting The Cost Of AI Inference – And Projecting It Far Out
    • IBM i PTF Guide, Volume 28, Number 13
    • The Next Generation Of IBM i Talent in GenAI Action

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle