Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Symantec is advising users of its pcAnywhere remote access product to disable the software if they don't absolutely need it.
Warnings come amid confirmation by the security giant that hackers stole a portion of the company's source code dating back to 2006.
The code related to the 2006 versions of Norton Antivirus Corporate Edition, Norton Internet Security, Norton SystemWorks and pcAnywhere.
The code is old enough, however, that users of the Norton products do not face any increased threat of attack, the note said.
However, pcAnywhere customers do face elevated risk, which contradicts earlier statements from the company that its products were not vulnerable due to the theft and that its own network was not breached.
"Our current analysis shows that all pcAnywhere 12.0, 12.1 and 12.5 customers are at increased risk, as well as customers using prior versions of the product," Symantec said on its website.
"pcAnywhere is also bundled with numerous Symantec products. The full standalone product is bundled in a number of Altiris-based solutions."
Altiris products perform IT management functions.
A white paper released Wednesday recommended that pcAnywhere users stop using the software until permanent patches are available, unless they require it for mission-critical operations.
"Malicious users with access to the source code have an increased ability to identify vulnerabilities and build new exploits," the paper said.
"Additionally, customers that are not following general security best practices are susceptible to man-in-the-middle attacks which can reveal authentication and session information...At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks."
In a Wednesday security advisory, Symantec disclosed two vulnerabilities, one related "high" in severity, that impact pcAnywhere.
The flaws can be exploited to elevate privileges or execute remote code, and Symantec has made available a hotfix.
In addition, the company issued recommendations for organisations that require the use of remote access software, such as pcAnywhere. They include setting corporate firewalls to bar inbound or outbound traffic not using VPN tunnels, and creating password-strength policies.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.