May 18, 2016 By Douglas Bonderud 2 min read

Antivirus tools are designed to keep corporate networks healthy, but this kind of virtual medicine often comes with troubling side effects. In December 2015, for example, memory allocation issues made it possible to compromise AVG, McAfee and Kaspersky Lab products, Dark Reading reported.

According to CIO Online, Symantec is now on the list thanks to a high-risk exploit that Google researcher Tavis Ormandy said “is about as bad as it can possibly get.”

Symantec’s Protection Prognosis

It’s worth mentioning upfront that Symantec has already released a fix for this issue in its Antivirus Engine 20151.1.1.4 update on May 16. Companies that haven’t patched their systems need to do so right now since even the security company itself gives this vulnerability a 9.1 out of 10 on the CVSS severity scale.

So what’s the big deal? First, the flaw is cross-platform, which means that Linux, Mac and Windows machines are all under threat. More worrisome? All it takes is a malicious email attachment containing a file header identifying it as an ASPack compression.

It gets worse: Users don’t even need to open the email. Once Symantec’s antivirus product scans the attachment, it’s automatically unpacked in the OS kernel — the most privileged part of any system.

On Linux, Mac and UNIX platforms, the result is a remote heap overflow, while in Windows, the flaw results in a remote ring0 memory corruption causing an immediate system crash or blue screen of death. Actors can also infect systems by sending along a malicious link, but that requires confidence that users will blindly follow instructions. Why bother when the antivirus tools will do all the heavy lifting?

Evolving Antivirus Programs

More than a few antivirus programs have come under fire for having their own security flaws. While vendors are often quick to respond with patches and live updates, this is a dangerous trend in the making.

Researchers haven’t been silent and have been blasting companies for years about unsafe scanning processes that — if exploited — can lead to more serious compromises than most malware payloads could hope to achieve.

It’s a relatable conundrum: Security companies don’t want to lose their share of the market and often choose speed over safety, something corporate IT departments struggle with on a daily basis. But the continuing parade of bad medicine stories suggests that it’s time for a change; using kernel privileges carries the risk of Heartbleed-like failure and simply isn’t worthwhile in the long term.

Bottom line? Antivirus tools need to evolve if they want to stay competitive. Businesses can’t afford antivirus cures worse than the disease.

More from

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today