McAfee Latest Anti-virus Vendor With Flaws

The flaw were discovered by Internet Security Systems, an Atlanta-based intrusion detection and prevention provider, and marks the fourth time since early last month that ISS has tapped anti-virus scanner bugs. Previously, it named vulnerabilities in Symantec's, F-Secure's, and Trend Micro's product lines. Another security firm, eEye Digital Security, added its voice to the chorus early this month when it publicized bugs within Computer Associates' licensing software that's used in its security software.

But users who have been methodical about keeping their anti-virus products up-to-date are not at risk, a McAfee executive assured users Friday.

"The liability for users is quite low," said Steve Crutchfield, the director of product marketing for McAfee's anti-virus line. "It involves old technology, the VirusScan Scan Engine 4320, which we replaced in November 2004."

Customers who haven't upgraded from the earlier scanning engine should still be safe, said Crutchfield, if they updated their anti-virus signature file on or after March 1, 2005.

Sponsored post

"If they're not up to date, they could be vulnerable," added Crutchfield, pointing out that current users who have let their update subscription lapse would be among that number.

According to ISS, hackers could cause a buffer overflow on a targeted PC, server, or gateway using the older scanning engine by crafting a malicious compressed file in LHA format. Once the buffer overflow had been created, the attackers could gain access to the system.

"McAfee AntiVirus Library is likely vulnerable through common protocols, e.g. SMTP, HTTP, FTP, SMB," wrote ISS in its online alert. "No authentication is required for an attacker to leverage this vulnerability to compromise a antivirus protected network or machine. It is likely McAfee AntiVirus Library implementations are vulnerable in their default configurations."

While ISS doesn't mark its advisories with level labels, Danish security firm Secunia called the McAfee vulnerability "Highly Critical," its second-most-dire warning.

The vulnerability is similar to those discovered by ISS's researcher, Alex Wheeler, in rival products, which had flaws -- since patched -- in how they handled compressed file formats such as ARJ (Trend Micro and F-Secure) and UPX (Symantec).

Like other vendors recently named by ISS, McAfee said it welcomed investigation of its products' security. "At the end of the day, we all want to keep our customers happy," said Crutchfield. "We like to work with the research community to make sure that our products are as risk-free as possible.

"No hard feelings," he added.

McAfee has posted a security bulletin on its Web site with more detailed information for customers about the vulnerability and how to correct the problem if they've not recently updated their software.

Another document on the site explains how McAfee anti-virus users can tell if their software is up to date.