DoS Vulnerability Affects Symantec Endpoint Protection (SEP) and Norton Products on Windows
Symantec has recently patched a denial of service (DoS) vulnerability that plagued its Norton Security’s Portable Executable file scanning functionality.
The security flaw, tracked as CVE-2016-5308 could be exploited during the parsing of a special crafted portable executable file, the researchers warn. Because the faulting code is located in the IDSvix86 kernel driver, the parsing of the PE file can cause an access violation in the IDSvix86 driver, which would result in denial of service.
Discovered by Piotr Bania of Cisco Talos, the vulnerability was tested on version 22.6.0.142 of Symantec Norton Security and on DSvix86 driver version 15.1.0.1263. To successfully exploit the vulnerability, an attacker would have to send the victim a crafted file with a large SizeOfRawData field in a section header, Talos says.
“The parser does not check to make sure that this is within the bounds of the file, or MD5Compress which is the function that causes the segfault, therefore if the parameter is big enough, it can cause the MD5Compress function to access memory which is currently unavailable causing the machine to crash,” Talos explains in a blog post.
In an advisory detailing the vulnerability, Symantec says that the issue is located in the Client Intrusion Detection System (CIDS) driver, which could cause a system crash when interacted with a specially-crafted PE file. The company also reveals that the bug affects not only the Windows version of the Norton Security, but also Symantec Endpoint Protection.
According to Symantec, the security flaw has a CVSS:3.0 base score of 5.0 and is considered Medium severity because the attacker would have to trick the user to download the malformed PE file and then manipulate it to interact with the vulnerable CIDS engine. Talos’ advisory, on the other hand, claims that the vulnerability has a CVSS:3.0 score of 7.5.
The Cisco Talos team explains that they worked with Symantec to responsibly disclose the vulnerability. However, while the team warned Symantec on this vulnerability at the end of May, a patch for the issue wasn’t released until July 7, when the security flaw was also made public.
Norton Security users can stay protected by updating to CIDS v15.1.2 via LiveUpdate Defs, while Symantec Endpoint Protection customers should update to CIDS v15.0.6 to ensure they are kept safe.
In May, Google Project Zero researcher Tavis Ormandy discovered an issue related to how the Symantec AVE parses executable files packed by the ASPack executable file compressor and revealed that Symantec Endpoint Antivirus, Norton Antivirus, Symantec Email Security and Symantec Scan Engine were affected. The Critical flaw could allow for remote code execution when a specially crafted file was sent to the victim.
Over the past several months, the researcher has analyzed the security products offered by various firms, including Trend Micro, Comodo, Kaspersky Lab, AVG, Avast and others, and revealed multiple vulnerabilities in them.

More from SecurityWeek News
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- In Other News: China Blames NSA for Hack, AI Jailbreaks, Netography Spin-Off
- SecurityWeek to Host Cyber AI & Automation Summit
- US Marks 22 Years Since 9/11 Terrorist Attacks
- In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach
- Webinar Today: Scaling Software Supply Chain Security
- In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs
- Webinar Today: ZTNA Superpowers CISOs Should Know
Latest News
- US State Department Says 60,000 Emails Taken in Alleged Chinese Hack
- Progress Software Patches Critical Pre-Auth Flaws in WS_FTP Server Product
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Lumu Raises $30 Million for Threat Detection and Response Platform
- Government Shutdown Could Bench 80% of CISA Staff
- Moving From Qualitative to Quantitative Cyber Risk Modeling
- Cisco Warns of IOS Software Zero-Day Exploitation Attempts
- Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits
