Lucian Constantin
CSO Senior Writer

Researcher releases exploit code that can allegedly crash pcAnywhere

news
Feb 22, 20122 mins

The exploit code can be used to crash an important pcAnywhere service called awhost32

Exploit code targeting a newly identified vulnerability in Symantec’s pcAnywhere computer remote control product has been published on the Internet, exposing its users to possible attacks that disrupt the software’s functionality.

The code was published Friday on Pastebin by Johnathan Norman, director of security research at network security vendor Alert Logic, and can be used to crash an important pcAnywhere service called awhost32.

[ The Web browser is your portal to the world — as well as the conduit that lets in many security threats. InfoWorld’s expert contributors show you how to secure your Web browsers in this “Web Browser Security Deep Dive” PDF guide. ]

The DoS (denial-of-service) condition is not persistent, because the awhost32 process is restarted automatically, Norman said. This means that attackers would need to execute the exploit in a loop in order to create longer disruptions.

This is just one of several vulnerabilities that Norman claims to have identified in pcAnywhere while investigating a more serious remote code execution flaw patched by Symantec last month. “Not sure what I’m going to do with all of them,” Norman said in a blog post on Friday.

According to the researcher, the exploit works against fully patched versions of pcAnywhere. “Symantec is aware of the posting and is investigating the claims,” a Symantec spokesman said via email. The company could not provide any additional information at this time.

This vulnerability disclosure comes after hackers associated with the hacktivist group Anonymous leaked the source code of pcAnywhere on the Internet at the beginning of this month.

Following the source code’s theft in early January, Symantec recommended that pcAnywhere users disable the application until it had a chance to issue patches for several vulnerabilities found in the product. Later that same month, the company gave pcAnywhere a clean bill of health after releasing several hotfixes.

However, the leak of the product’s source code could theoretically pave the way for the identification of other vulnerabilities. An analysis of the leaked pcAnywhere files and documents performed by an anonymous researcher and published Friday by the InfoSec Institute concluded that the application has not changed much over the years. The current version is probably a continuation of the old code base instead of a rewrite.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author