First published: 29th January 2014
Graham Sutherland of Portcullis Computer Security Ltd recently identified and responsibly disclosed a vulnerability in Sophos Anti-Virus Engine (SAV Engine) running on Microsoft Windows platforms. The vulnerability could in theory have allowed a remote attacker to manipulate the SAV Engine, which could result in protection being disabled or bypassed by an attacker.
Sophos has, on 22 January, released an engine update that fixes the vulnerability and users with the default configuration will receive the update automatically. The vulnerability affected Endpoint Security and Control for Windows client included in the company's Endpoint/Enduser, PureMessage, and SharePoint products.