How Google Finds Symantec-Norton Security Holes

Troubles have once again found Norton Security and Symantec Security software. In late June, Google’s Project Zero found critical vulnerabilities in the sever protection systems. Google stated that: “these...

Troubles have once again found Norton Security and Symantec Security software. In late June, Google’s Project Zero found critical vulnerabilities in the sever protection systems. Google stated that: “these vulnerabilities are as bad as it gets. They don’t require any user interaction, they affect the default configuration, and the software runs at the highest privilege levels possible. In certain cases, on Windows, vulnerable code is even loaded into the kernel, resulting in remote kernel memory corruption. As Symantec use the same core engine across their entire product line, all Symantec and Norton-branded antivirus products are affected by these vulnerabilities (Omandy, 2016).”

Norton is an affiliated cyber-security firm under the umbrella of Symantec Security. All security services on the market must manage their vulnerabilities. This is where organizations and services like Google’s Project Zero come in. Symantec/Norton hire third party computer coders to seek out vulnerabilities in their security system. They are also supposed to monitor for new releases of third party software, watch for vulnerability announcements and distribute updates on these vulnerabilities. Symantec did not perform any of these required responsibilities. In fact, Symantec has been using code derived from open source libraries but have not updated these codes in the last 7 years.

Some of the vulnerabilities in Symantec’s/Norton’s software include but are not limited to:

  • PowerPoint Stream Stack Buffer Overflow
  • Bloodhound Heuristics
  • Exploitation
  • Memory Corruption

Google has long had a relationship and been active in the security research community. In order to find vulnerabilities in websites and security software services Google created the Project Zero team. The goal of the team is to find vulnerabilities and report on them in order for the problem to be solved before someone with malicious intent finds these holes. It is important to remember that companies like Symantec and Norton are not delinquent or reneging on their responsibilities. There will always be holes in security services, which is why companies hire third party vulnerability seekers.

In order to find the vulnerabilities Google gathers information on Symantec. Usually information that can be found online, any person with the desire can find this public information. Project Zero will scour blogs, websites, social media or any source that would have useful information. They are looking for clues regarding email addresses and network layout or structure.

After the legal and public information is collected the Project Zero team will scan for open ports on the target. Certain port numbers will alert Project Zero to vulnerabilities. Services listen to ports, if you are able to manipulate the port number than a hacker could use this information to get the port to do anything they wanted.

Google Project Zero will then use their automatic vulnerability scanner in order to be alerted to vulnerabilities faster than manually looking for them. It will usually poke around in the unpatched software and testing the version number of the software. Once the vulnerabilities have been found the team will start testing these vulnerabilities.

Security researchers cannot rely solely on the tools that have already been created if the goal is to find all of the vulnerabilities in the security software. It is at this point where Project Zero team members will manually attempt to “break” into the software. The team members need an extensive knowledge on how software works in order to avoid permanently damaging the client’s software.

Once a vulnerability is found there is a standard course of action Google Project Zero must adhere to. The team must tell the company before informing anybody else. In turn the company asks for a set amount of time to repair the vulnerability before the information is disclosed to the public.

Symantec and Norton have started to begin patching their vulnerabilities in their cloud-based products and the legacy products will be patched shortly. However, it will not take long for criminal hackers to also spot these vulnerabilities and take advantage of them.

Categories
Featured
54 Comments on this post.
  • Douglascep
    30 November 2020 at 3:26 pm
  • Brianrog
    3 December 2020 at 9:39 am

    generic viagra without a doctor prescription cheap viagra best place to buy viagra online

  • Brianrog
    3 December 2020 at 5:47 pm

    generic viagra without a doctor prescription Cipro best treatment for ed

  • Brianrog
    4 December 2020 at 1:33 am

    100mg viagra generic viagra viagra without a doctor prescription canada

  • Brianrog
    4 December 2020 at 11:55 am

    cialis without doctor prescription cialis for sale cialis headaches afterwards

  • Brianrog
    4 December 2020 at 8:58 pm
  • Brianrog
    5 December 2020 at 6:01 am
  • PhilipBaill
    7 December 2020 at 5:41 am
  • PhilipBaill
    7 December 2020 at 2:11 pm
  • DanielJaf
    9 December 2020 at 5:35 pm
  • DanielJaf
    10 December 2020 at 1:53 am
  • DanielJaf
    10 December 2020 at 10:16 am

    generic viagra online for sale viagra 100mg where to buy viagra online

  • DanielJaf
    10 December 2020 at 6:21 pm
  • DanielJaf
    11 December 2020 at 2:25 am
  • DanielJaf
    11 December 2020 at 10:20 am
  • DanielJaf
    11 December 2020 at 6:31 pm
  • Alleninefs
    12 December 2020 at 12:54 pm
  • Alleninefs
    12 December 2020 at 8:46 pm
  • Alleninefs
    13 December 2020 at 4:59 am
  • WilfredNib
    15 December 2020 at 2:09 pm

    buy anti biotics without prescription men’s ed pills best erectile dysfunction medication

  • WilfredNib
    15 December 2020 at 10:54 pm
  • WilfredNib
    16 December 2020 at 7:17 am
  • WilfredNib
    16 December 2020 at 7:02 pm
  • HaroldJam
    17 December 2020 at 1:45 pm
  • HaroldJam
    18 December 2020 at 2:05 am
  • HaroldJam
    18 December 2020 at 1:47 pm

    cialis without a doctor’s prescription cialis cialis 20mg price

  • HaroldJam
    19 December 2020 at 1:45 am

    natural ed pills lipitor lipitor generic india

  • HaroldJam
    19 December 2020 at 1:54 pm
  • HaroldJam
    20 December 2020 at 2:01 am
  • HaroldJam
    20 December 2020 at 1:52 pm
  • HaroldJam
    21 December 2020 at 1:37 am
  • IsaacPex
    21 December 2020 at 3:13 pm
  • IsaacPex
    22 December 2020 at 2:59 am
  • IsaacPex
    22 December 2020 at 2:58 pm
  • Johnnypauct
    23 December 2020 at 7:04 pm
  • Johnnypauct
    24 December 2020 at 7:48 am
  • Johnnypauct
    24 December 2020 at 8:34 pm
  • Johnnypauct
    25 December 2020 at 9:02 am
  • Johnnypauct
    25 December 2020 at 9:32 pm
  • Johnnypauct
    26 December 2020 at 11:24 am

    generic acyclovir cream cost acyclovir zovirax acyclovir cream over the counter singapore

  • Jamesber
    29 December 2020 at 10:03 pm
  • Jamesber
    30 December 2020 at 3:17 pm
  • Jamesber
    31 December 2020 at 8:32 am
  • Jamesber
    1 January 2021 at 1:43 am
  • Jamesber
    1 January 2021 at 7:04 pm
  • GeorgeItaTs
    3 January 2021 at 7:44 pm
  • GeorgeItaTs
    4 January 2021 at 1:07 pm
  • DavidApose
    11 January 2021 at 6:41 pm
  • DavidApose
    12 January 2021 at 6:14 pm
  • DavidApose
    13 January 2021 at 5:35 pm
  • DavidDausy
    15 January 2021 at 12:23 pm
  • DavidDausy
    16 January 2021 at 12:11 pm
  • Robertfom
    17 January 2021 at 6:13 pm
  • Michaelwer
    19 January 2021 at 8:57 pm
  • Leave a Reply

    *

    *

    RELATED BY