This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Symantec confirms and fixes multiple critical bugs

Share this article:
Symantec confirms and fixes multiple critical bugs
Symantec confirms and fixes multiple critical bugs

Multiple critical vulnerabilities have been reported in Symantec's Web Gateway.

The technology, the Symantec's Protection Suite, contained vulnerabilities that would allow an attacker to run arbitrary commands with the privileges of the “root”, user while an attacker could get unauthorized access to the appliance.

According to research by Austrian firm SEC Consult Vulnerability Lab, the flaws could have permitted visibility of web traffic, interception of HTTP and the plain text form of HTTPS traffic. If SSL deep inspection is enabled, the appliance holds a private key for a Certificate Authority (CA) which if compromised by an attacker, would allow arbitrary certificates to be signed.

It said: “The recommendation of SEC Consult is to switch off the product until a comprehensive security audit based on a security source code review has been performed and all identified security deficiencies have been resolved by the vendor.”

It said that there were six vulnerabilities in total that would allow: reflected cross-site scripting; persistent cross-site scripting; OS command injection; security misconfiguration; SQL Injection; and cross-site request forgery.

Symantec was informed of the flaws on the 22nd February and existed in version 5.1.0.39 of the Symantec Web Gateway, the most recent version at the time of discovery. Symantec releases an advisory and product update on Thursday 25th July and confirmed that previous versions were affected. It recommended users update to Symantec Web Gateway version 5.1.1.

Symantec thanked Wolfgang Ettlinger and Stefan Viehböck from SEC Consult for reporting five of the flaws, and Offensive Security for reporting CVE-2013-4673.

It said in an advisory: “Symantec engineers verified these issues and have released an update to address them. Symantec engineers continue to review related functionality to further enhance the overall security of Symantec Web Gateway.

“Symantec Security Response has released IPS signature 26812 – ‘Web Attack: Symantec Web Gateway XSS' to help detect and block remote exploit attempts. Signatures are available through normal Symantec security updates.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...