Symantec’s PCAnywhere can be Targeted with Source Code
An exploit code that demonstrates the process of crashing PCAnywhere has been published on the Internet. Consequently, according to security researchers, malware creators can exploit various versions utilizing this code; reported EWeek.com dated February 21, 2012. However, researchers at Symantec asserted the opposite happening; in spite of that security investigators are currently convinced that malware creators may search for the exposed source-code of PCAnywhere followed with uncovering security flaws, which are exploitable within the existing versions.
Essentially, according to Symantec the security software provider, in the instance of consumers deploying security fixes for their software, they should remain safeguarded against probable assaults. These assaults, emanating due to the hackers getting hold of the leaked PCAnywhere code, may include issuing commands to the flawed PCs, warn the security experts. However, long after the release of the security fixes, Rapid7, a penetration testing and vulnerability management firm based in Boston claimed that its security researchers had in the weekend spotted 150,000-200,000 computers having active PCAnywhere editions without the patches.
One more vital truth, discovered about the source-code, relates to PCAnywhere's "silent" version, which while running on any system remains invisible to the end-user. Significantly, as per the exploit-code publisher, this truth assumes great importance as cyber-criminals may utilize the code for developing attack scripts of hidden-door nature. A report from Infosec Institute stated that hackers, who currently knew each of PCAnywhere's succulent facts along with all associated elements' source-code, considered their objectives sky-high. PCAnywhere was presently PCEverywhere, the report quipped. Redmondmag.com published this on February 22, 2012.
Moreover, CSO HD Moore of Rapid7 said that credit card-owning companies along with other e-commerce merchants seemingly were those greatest prone to attacks that relied on PCAnywhere's attack codes. Indeed, he added that many POS suppliers continued to advise their clients towards loading PCAnywhere application to enjoy remote access. TechWeek published this on February 22, 2012.
Meanwhile, as PCAnywhere's source-code becomes publicly known, it could give way to determining other security flaws. Thus, Symantec suggests that those using PCAnywhere should deactivate the software till the time the company develops patches for all the flaws identified within the product.
» SPAMfighter News - 2/29/2012
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!