A vulnerability in Symantec’s Antivirus Corporate Edition and Client Security products has been patched by the company.
In response to the news that an issue with a couple of its signature products could lead to remote code execution, Symantec released updates for the products containing the flaw.
The eEye digital security firm reported the problem initially, and discovered it was present in the newest versions of the affected Symantec products. Further research noted by Symantec described the problem as a flaw that made the products vulnerable to a stack overflow.
Once exploited, that overflow could have permitted an attacker to execute code on the machine, with System level rights. The issue was made worse by being one that impacted enterprise-level customers, big spenders that purchase hundreds or thousands of licenses depending on the size of the business.
A worm crafted to take advantage of the exploit could have had a disastrous impact on a company. It could have spread very quickly from unpatched machine to unpatched machine, similar in manner to the Sasser worm from 2004.
Symantec has English-language updates for Client Security 3.0 and 3.1, and Antivirus Corporate Edition 10.0 and 10.1. They noted localized builds are pending for other languages.