Needlessly abject

I am not a teenager. I play one on the Internet.

categories

non-blog

Other Blogs

20061215

Symantec Owns Up-- Sorta, Kinda

Finally, Symantec has to the problems we were seeing last week with the "Premium Anti-Spam" functionality in their Mail Security for Microsoft Exchange problem I blogged about last week. The rev of the article that I saw (last modified 20061206) looks really, really hurriedly written and error-filled ("Symantec Mail Security form Microsoft Exchange...", "<system drive>:\Program iles\Symantec...", poor capitalization of the name of the product in the "Solution" portion of the article).

I'm really disturbed that a flaw this serious was documented by Symantec on 20061201, but no effort was made to contact any Customers or to put the article in the knowledge-base. I have five (5) Customers with "Gold" support contracts (one with 800 seats), and nobody heard a thing from Symantec. When I searched on 20061207, I certainly didn't find this article in the Symantec knowledge-base.

It's helpful that Symantec doesn't identify the specific messages that you might see (except for an unhelpful dump of an event log message w/o the proper event parser DLL installed). In an effort to help people get to this article, I'll quote myself and others here, to see if search engines can help hook people up.

Application Log, Warning Event, Category None, ID: 1013, Source: W3SVC, A process serving application pool 'ExchangeApplicationPool' exceeded time limits during shut down. The process id was ####.
Application Log, Information Event, Category None, ID: 1082, Source: W3SVC, A worker process with pid '####' that serves application pool 'ExchangeApplicationPool' has been determined to be unhealthy (see previous event log message), but because a debugger is attached to it, the World Wide Web Publishing Service will ignore the error.
Application Log, Warning Event, Category None, ID: 1009, Source: W3SVC, A process serving application pool 'ExchangeApplicationPool' terminated unexpectedly. The process id was '5852'. The process exit code was '0xffffffff'.

It would be really interesting to get a sample of a message that overflows this buffer. I'm really interested to know if this buffer overflow is exploitable for more than just denial-of-service attacks. It would be absolutely wonderful to get word out to the trade press that Symantec sat on (and, really, is still sitting on) a remotely-exploitable buffer overflow in a major product like this. I'm frustrated that the tens of thousands of dollars per year that my Customers spend on this product funds this kind of idiocy. I'm definitely looking at strongly recommending a move to GFI email security and filtering applications, and away from this Symantec trash.


Valid HTML 4.01 StrictValid CSS!