[37694] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Full-Disclosure] [HV-LOW] Symantec LiveUpdate issues may cause DoS

daemon@ATHENA.MIT.EDU (Dan Margolis)
Tue Dec 14 12:11:31 2004

Date: Mon, 13 Dec 2004 21:45:36 -0500
From: Dan Margolis <krispykringle@gentoo.org>
To: bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
Message-ID: <20041214024536.GC11708@specialk>
Mail-Followup-To: Dan Margolis <krispykringle@gentoo.org>,
	bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20041104235602.GA1900@hexview.com>

If an attacker can spoof the signature file download site, he can
potentially do quite a bit worse than this (in that he can deny the
usability of the antivirus engine at all by providing a bogus
signature file). I'd think that some form of cryptography would be in
use to prevent this (either SSL or signing of the archives
themselves). Am I mistaken? 

(Caveat being that I don't use any anti-virus products of this nature,
so I really don't know.)

On Thu, Nov 04, 2004 at 03:56:02PM -0800, vuln@hexview.com wrote:
> After downloading ZIP archive off the website (either legitimate
> Symantec website or a spoofed one controlled by attacker)
-- 
Dan

home help back first fref pref prev next nref lref last post