Antivirus tools are designed to keep corporate networks healthy, but this kind of virtual medicine often comes with troubling side effects. In December 2015, for example, memory allocation issues made it possible to compromise AVG, McAfee and Kaspersky Lab products, Dark Reading reported.

According to CIO Online, Symantec is now on the list thanks to a high-risk exploit that Google researcher Tavis Ormandy said “is about as bad as it can possibly get.”

Symantec’s Protection Prognosis

It’s worth mentioning upfront that Symantec has already released a fix for this issue in its Antivirus Engine 20151.1.1.4 update on May 16. Companies that haven’t patched their systems need to do so right now since even the security company itself gives this vulnerability a 9.1 out of 10 on the CVSS severity scale.

So what’s the big deal? First, the flaw is cross-platform, which means that Linux, Mac and Windows machines are all under threat. More worrisome? All it takes is a malicious email attachment containing a file header identifying it as an ASPack compression.

It gets worse: Users don’t even need to open the email. Once Symantec’s antivirus product scans the attachment, it’s automatically unpacked in the OS kernel — the most privileged part of any system.

On Linux, Mac and UNIX platforms, the result is a remote heap overflow, while in Windows, the flaw results in a remote ring0 memory corruption causing an immediate system crash or blue screen of death. Actors can also infect systems by sending along a malicious link, but that requires confidence that users will blindly follow instructions. Why bother when the antivirus tools will do all the heavy lifting?

Evolving Antivirus Programs

More than a few antivirus programs have come under fire for having their own security flaws. While vendors are often quick to respond with patches and live updates, this is a dangerous trend in the making.

Researchers haven’t been silent and have been blasting companies for years about unsafe scanning processes that — if exploited — can lead to more serious compromises than most malware payloads could hope to achieve.

It’s a relatable conundrum: Security companies don’t want to lose their share of the market and often choose speed over safety, something corporate IT departments struggle with on a daily basis. But the continuing parade of bad medicine stories suggests that it’s time for a change; using kernel privileges carries the risk of Heartbleed-like failure and simply isn’t worthwhile in the long term.

Bottom line? Antivirus tools need to evolve if they want to stay competitive. Businesses can’t afford antivirus cures worse than the disease.

More from

Did Brazil DSL Modem Attacks Change Device Security?

From 2011 to 2012, millions of Internet users in Brazil fell victim to a massive attack against vulnerable DSL modems. By configuring the modems remotely, attackers could redirect users to malicious domain name system (DNS) servers. Victims trying to visit popular websites (Google, Facebook) were instead directed to imposter sites. These rogue sites then installed malware on victims' computers. According to a report from Kaspersky Lab Expert Fabio Assolini citing statistics from Brazil's Computer Emergency Response Team, the attack ultimately…

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…

Transitioning to Quantum-Safe Encryption

With their vast increase in computing power, quantum computers promise to revolutionize many fields. Artificial intelligence, medicine and space exploration all benefit from this technological leap — but that power is also a double-edged sword. The risk is that threat actors could abuse quantum computers to break the key cryptographic algorithms we depend upon for the safety of our digital world. This poses a threat to a wide range of critical areas. Fortunately, alternate cryptographic algorithms that are safe against…

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…