Symantec was always useless ...
... and went down-hill after Peter Norton cashed out.
Seems the more things change, the more they stay the same. IMO, of course.
Get patching, sysadmins, there's a zero-day in Symantec Endpoint Protection (SEP). This US-CERT advisory is alerting anyone who ignored Symatec's note about the issue. CVE-2014-3434 is a local access vulnerability with a public exploit. A client buffer overflow can cause a blue-screen-of-death on the client, which could also …
I haven't USED it in 25 years. I have, however, evaluated it regularly over that time-frame. Why? To know enough about the product to steer corporate clients into a sane direction.
Google+ does suck. Badly. How do I know? See above paragraph. There are far better solutions.
"Offensive Security reported on their website that they had identified an escalation of privilege vulnerability within Symantec Endpoint Protection (SEP)" ref
What we need is a SEP protection to protect against the vulnerabilities in Symantec Endpoint Protection, in other words, because SEP is just another Windows process, it's just as vulnerable as any other Windows app.
Biting the hand that feeds IT © 1998–2021