A Windows 98 & ME forum. Win98banter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » Win98banter forum » Windows 98 » General
Site Map Home Authors List Search Today's Posts Mark Forums Read Web Partners

ATTN: Users of NAV/NSW/NIS 2004



 
 
Thread Tools Display Modes
  #1  
Old February 11th 05, 02:21 AM
PA Bear
external usenet poster
 
Posts: n/a
Default ATTN: Users of NAV/NSW/NIS 2004

Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html
--
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security
  #2  
Old February 11th 05, 05:50 AM
PA Bear
external usenet poster
 
Posts: n/a
Default

As of : February 10th 2005 19:38 UTC
http://isc.sans.org/diary.php?date=2005-02-09

* Updated: Serious Symantec Vulnerability, 1-day exploits, and the
missing 13th patch

Serious Symantec Vulnerability

Update: It appears that Symantec has not actually released the patches
as is mentioned on their web site. We have not found any patches for the
Symantec Antivirus Corporate Edition 8 and 9. We are investigating this
futher.
http://www.sarc.com/avcenter/securit...005.02.08.html *
--
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security

PA Bear wrote:
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html

  #3  
Old February 11th 05, 07:51 AM
Dan
external usenet poster
 
Posts: n/a
Default

Thanks Robear. This is another hit against Symantec and a great reason to
avoid Symantec (Norton) products in the future.

"PA Bear" wrote in message
...
: As of : February 10th 2005 19:38 UTC
: http://isc.sans.org/diary.php?date=2005-02-09
:
: * Updated: Serious Symantec Vulnerability, 1-day exploits, and the
: missing 13th patch
:
: Serious Symantec Vulnerability
:
: Update: It appears that Symantec has not actually released the patches
: as is mentioned on their web site. We have not found any patches for the
: Symantec Antivirus Corporate Edition 8 and 9. We are investigating this
: futher.
: http://www.sarc.com/avcenter/securit...005.02.08.html *
: --
: ~Robear Dyer (PA Bear)
: MS MVP-Windows (Shell, IE/OE) & Security
:
: PA Bear wrote:
: Symantec UPX Parsing Engine Heap Overflow
: http://secunia.com/advisories/14179
: http://www.sarc.com/avcenter/securit...005.02.08.html


  #4  
Old February 11th 05, 09:00 AM
Bill Ridgeway
external usenet poster
 
Posts: n/a
Default

It sounds as though this may be important. I would therefore appreciate it
if someone could give a plain English explanation of what this means in
practical terms (i.e. what sort of threat does this pose)?

Thanks.

Bill Ridgeway

"PA Bear" wrote in message
...
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html --
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security



  #5  
Old February 11th 05, 12:27 PM
Richard G. Harper
external usenet poster
 
Posts: n/a
Default

In short - a buffer overflow bug is one where an input buffer in a program
can be caused to overflow by sending it unexpected data. In many cases this
causes a condition where the data that over-fills the buffer can be run on
the computer, in the case of a Windows 98 computer that means the program
(overflow data) will run with full administrator rights. That's bad.

Any buffer overflow bug/exploit should be considered a serious threat to
your computer since at the least it means the affected software will crash,
in Windows 98 usually taking the rest of the operating system with it. At
the most it means that someone else can run a program on your computer with
the same rights you have - erasing files, installing
spyware/adware/keyloggers/backdoors, re-routing your Internet connection for
their own malicious gains, and so on.

--
Richard G. Harper [MVP Shell/User]
* PLEASE post all messages and replies in the newsgroups
* for the benefit of all. Private mail is usually not replied to.
* My website, such as it is ...
http://rgharper.mvps.org/
* HELP us help YOU ... http://www.dts-l.org/goodpost.htm


"Bill Ridgeway" wrote in message
...
It sounds as though this may be important. I would therefore appreciate
it if someone could give a plain English explanation of what this means in
practical terms (i.e. what sort of threat does this pose)?

Thanks.

Bill Ridgeway

"PA Bear" wrote in message
...
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html --
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security





  #6  
Old February 11th 05, 04:05 PM
Haggis
external usenet poster
 
Posts: n/a
Default


"PA Bear" wrote in message
...
As of : February 10th 2005 19:38 UTC
http://isc.sans.org/diary.php?date=2005-02-09

* Updated: Serious Symantec Vulnerability, 1-day exploits, and the
missing 13th patch

Serious Symantec Vulnerability

Update: It appears that Symantec has not actually released the patches
as is mentioned on their web site. We have not found any patches for the
Symantec Antivirus Corporate Edition 8 and 9. We are investigating this
futher.
http://www.sarc.com/avcenter/securit...005.02.08.html * --
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security

PA Bear wrote:
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html


LU downloaded a ~10mb server patch today (SAV corp 9)


  #7  
Old February 11th 05, 06:53 PM
Nigel Stapley
external usenet poster
 
Posts: n/a
Default

PA Bear wrote:
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html


Yes, I read that at The Register. It took a while to stop laughing.

--
Regards

Nigel Stapley (Norton-free since Jan. '04)

www.judgemental.plus.com

reply-to will bounce
  #8  
Old February 11th 05, 07:03 PM
PA Bear
external usenet poster
 
Posts: n/a
Default

Update:

http://service1.symantec.com/SUPPORT...05020911112648
--
~Robear Dyer (PA Bear)
MS MVP-Windows (Shell, IE/OE) & Security

PA Bear wrote:
As of : February 10th 2005 19:38 UTC
http://isc.sans.org/diary.php?date=2005-02-09

* Updated: Serious Symantec Vulnerability, 1-day exploits, and the
missing 13th patch

Serious Symantec Vulnerability

Update: It appears that Symantec has not actually released the patches
as is mentioned on their web site. We have not found any patches for the
Symantec Antivirus Corporate Edition 8 and 9. We are investigating this
futher.
http://www.sarc.com/avcenter/securit...005.02.08.html *

PA Bear wrote:
Symantec UPX Parsing Engine Heap Overflow
http://secunia.com/advisories/14179
http://www.sarc.com/avcenter/securit...005.02.08.html


 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Start Up Mystery! Marco772 General 7 January 17th 05 09:04 AM
Spybot and BHO question, running 98-se Star General 31 September 3rd 04 10:53 PM
New Install of Windows & W-TShooters question Star General 26 August 30th 04 07:48 AM
File 'REGDEF' not found John Atkinson General 9 June 14th 04 08:13 PM
Internet connection Smuga Setup & Installation 9 June 7th 04 08:46 PM


All times are GMT +1. The time now is 04:25 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 Win98banter.
The comments are property of their posters.