iTnews

Secunia tracking flaws in Panda virus scan

By Dan Kaplan on Nov 16, 2006 7:29PM

Vulnerability assessment firm Secunia said today it is tracking two bugs and a weakness in Panda Software's free virus scan that could lead to remote code execution.

The two vulnerabilities in Panda ActiveScan - which claims to wipe clean any of more than 110,000 viruses, worms and trojans from a user's system - are related to a flawed ActiveX control that could result in buffer overflow, according to a Secunia advisory, which rates the problem "highly critical."

A malicious website, for example, can exploit the flaws, which cause a user's system to restart without warning and provide attackers with knowledge of system files and their sizes.

Secunia also reported a weakness in Active Scan in which the flawed ActiveX control does not permit thread safety, or proper functioning when code is launched by multiple threads.

"This can be exploited by…a malicious website via a race condition to corrupt memory and execute arbitrary code," according to Secunia. Race conditions occur when system output is reliant on the timing of other events.

As a fix, Secunia suggests users upgrade to ActiveScan version 5.54.01.

Ryan Sherstobitoff, Panda's product technology officer, told SCMagazine.com today that the flaws have been patched and users should feel confident running the scan.

"Being the fact that this is an online scan, our developers were able to respond and patch this situation before it was able to affect a large amount of users," he said. "The chances of getting attacked is kind of limited because you're not running anything resident on the machine. It's pretty difficult to carry out a widespread attack."

He said he was not aware of any users being infected.

Click here to email Dan Kaplan.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:
flawsinpandascansecuniasecuritytrackingvirus

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Vast majority of surveyed firms still rely on password authentication
Promoted Content Vast majority of surveyed firms still rely on password authentication
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Dan Kaplan
Nov 16 2006
7:29PM
0 Comments

Related Articles

  • Geolocation threats rise following demonstration of router hacking that can pinpoint a person's home
  • Google delays Chrome's blocking of tracking cookies to late 2023
  • China spied on Russian defence research institutes
  • 'White hat' hackers no longer risk prosecution by the US
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

Westpac promotes its head of technology to mortgage role

Westpac promotes its head of technology to mortgage role

Digital Nation

COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.