Panda Platinum Internet Security Insecure Default Directory
SECUNIA ADVISORY ID:
Panda Platinum 2007 Internet Security 11.x
Panda Platinum 2006 Internet Security 10.x
3APA3A has discovered a security issue in Panda Platinum Internet
Security, which can be exploited by malicious, local users to gain
The problem is caused due to the application setting insecure default
permissions (grants "Everyone" group "Full Control") on the "Panda
Platinum 2006 Internet Security" / "Panda Platinum 2007 Internet
Security" directory and all child objects. This can be exploited to
remove, manipulate, and replace any of the application's files.
Successful exploitation allows execution of arbitrary code with
It has also been reported that the spam filtering can be managed via
the web interface listening on localhost on port 6083/tcp.
The security issue has been confirmed in Panda Platinum 2007 Internet
Security 11.00.00 and has also been reported in Panda Platinum 2006
Internet Security 10.02.01. Other versions may also be affected.
Grant only trusted users access to affected systems.
Set proper permissions on the directory and all child objects (this
may impact the functionality).
PROVIDED AND/OR DISCOVERED BY:
[Microsoft investigates a vulnerability in Word 2000 - 7/09/06
- Microsoft investigates a vulnerability in Word 2000 -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)
Madrid, September 7, 2006 - Microsoft has published a security advisory informing that it is investigating public reports of ?zero-day? attacks using a new vulnerability in Microsoft Word 2000.
According to Microsoft, for this attack to be carried out, the user must first open a malicious Word file received as an attachment to an email message or through other means. The advisory does not provide any information about this problem, except that it occurs when the word processor opens a specially crafted Word file with a malformed string, which could corrupt the memory and allow arbitrary code to be executed.
Microsoft reports that the update for correcting this flaw is under development and offers the use of Word Viewer 2003 to open and read this type of document as a workaround. Word Viewer 2003 does not include vulnerable code and is not susceptible to attack. Word Viewer 2003 is available at: http://www.microsoft.com/downloads/details.aspx?familyid=95E24C87-8732-48D5-8689-AB826E7B8FDF.
In any case, as always, users are advised not to open or save Word file received from un-trusted sources and to make sure that they have a security solution installed that integrates a firewall, to prevent direct attacks on the system, and a good, constantly updated antivirus, to protect against malicious code.