symantec 误
A new security vulnerability has been found within Symantec and Norton Anti-virus core code that potentially allows an attacker to take full control over the target machine.
在Symantec和Norton Anti-virus核心代码中发现了一个新的安全漏洞,该漏洞可能使攻击者可以完全控制目标计算机 。
What is different about this particularly vulnerability is that it does not require the end user to perform any interaction with the infected file but rather the exploit is automatically executed when the antivirus engine loads the file into memory for scanning, this makes the vulnerability particularly dangerous.
此特定漏洞的不同之处在于,它不需要最终用户与受感染文件进行任何交互,而是在防病毒引擎将文件加载到内存中进行扫描时自动执行漏洞利用,这使该漏洞特别危险。
For clients that have Symantec endpoint installed and managed by us you will have been contacted via email and our engineers are in the process of patching all installations; however if you have installed Symantec yourself or use it locally it is imperative you take action immediately to install the latest updates.
对于已经由我们安装和管理Symantec端点的客户端,将通过电子邮件与您联系,我们的工程师正在修补所有安装; 但是,如果您自己安装了Symantec或在本地使用Symantec,则必须立即采取措施以安装最新更新。
For further information, please see the following advisory
欲了解更多信息,请参见下面的咨询
If you have any concerns or are not sure if your services may be affected by this vulnerability please contact our support team who will be happy to advise.
如果您有任何疑问或不确定您的服务是否会受到此漏洞的影响,请联系我们的支持团队,我们将竭诚为您提供建议。
翻译自: https://www.eukhost.com/blog/webhosting/symantec-endpoint-vulnerability-advisory/
symantec 误