This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Symantec quells fears of PGP vulnerability

Share this article:

Symantec has quenched fears about a vulnerability in its PGP technology.

According to a Pastebin statement, the pgpwded.sys kernel driver distributed with Symantec PGP Desktop contains an arbitrary memory overwrite vulnerability in the handling of IOCTL 0x80022058.

While the statement admitted that an attacker would need local access to a vulnerable computer to exploit this vulnerability, successful exploitation of this issue would allow an attacker to execute arbitrary code.

The statement also said that this vulnerability (METHO_BUFFERED with output_size == 0) exploit works only on Windows XP/2003.

A Symantec blog acknowledged the discovery and reality of the vulnerability. Kelvin Kwan, product marketing manager at Symantec, said: “There is a potential issue, but it cannot easily be exploited.”

Kwan said that the exploit would be very difficult to trigger as it relies on the system entering an error condition first and once in this error condition, the exploit could allow an attacker with lower privileges to run some arbitrary code with higher privileges.

This vulnerability is limited to systems running Windows XP and Windows 2003 and is not present in later versions of Windows.  

Kwan said: “The plan is to have a fix in an upcoming maintenance pack. The expected availability of the maintenance pack is early February.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

State-sponsored attacks expected to get worse

State-sponsored attacks expected to get worse

A loss of confidence in perimeter defence has led many infosec professionals to question the ability of their organisation to withstand Advanced Persistent Threats (APTs).

Xen hypervisor found wanting on security

Xen hypervisor found wanting on security

The Xen hypervisor - an open source project that forms the basis of a wide range of virtualised servers - has been found to be vulnerable to a new attack ...

Shellshock vulnerabilities exploited in the wild

Shellshock vulnerabilities exploited in the wild

Linux: open source software is highly pervasive making the Shellshock vulnerability potentially more serious than Heartbleed.