PcAnywhere code stolen, Symantec warns of exploits

Powered by SC Magazine
 

Company recommends to stop using its product pending fixes.

Symantec is advising users of its pcAnywhere remote access product to disable the software if they don't absolutely need it.

Warnings come amid confirmation by the security giant that hackers stole a portion of the company's source code dating back to 2006.

The code related to the 2006 versions of Norton Antivirus Corporate Edition, Norton Internet Security, Norton SystemWorks and pcAnywhere.

The code is old enough, however, that users of the Norton products do not face any increased threat of attack, the note said.

However, pcAnywhere customers do face elevated risk, which contradicts earlier statements from the company that its products were not vulnerable due to the theft and that its own network was not breached.

"Our current analysis shows that all pcAnywhere 12.0, 12.1 and 12.5 customers are at increased risk, as well as customers using prior versions of the product," Symantec said on its website.

"pcAnywhere is also bundled with numerous Symantec products. The full standalone product is bundled in a number of Altiris-based solutions."

Altiris products perform IT management functions.

A white paper released Wednesday recommended that pcAnywhere users stop using the software until permanent patches are available, unless they require it for mission-critical operations.

"Malicious users with access to the source code have an increased ability to identify vulnerabilities and build new exploits," the paper said.

"Additionally, customers that are not following general security best practices are susceptible to man-in-the-middle attacks which can reveal authentication and session information...At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks."

In a Wednesday security advisory, Symantec disclosed two vulnerabilities, one related "high" in severity, that impact pcAnywhere.

The flaws can be exploited to elevate privileges or execute remote code, and Symantec has made available a hotfix.

In addition, the company issued recommendations for organisations that require the use of remote access software, such as pcAnywhere. They include setting corporate firewalls to bar inbound or outbound traffic not using VPN tunnels, and creating password-strength policies.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


PcAnywhere code stolen, Symantec warns of exploits
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1869

Vote
Do you support the abolition of the Office of the Information Commissioner?