Symantec Patches Remote Exploit in SAV part 3

SANS ISC is reporting that

Some have reported that the patching process is not trivial, and can be difficult to roll out in some environments.

What exactly does this mean? In the not so distant past patching Symantec has meant testing and rolling out an entirely new version of the product. If you know anything about mst files, this is much simpler. I guess some people are expecting this to be deployable through liveupdate. Not sure where they’d pick up that expectation. Deployment of this patch will require a reboot, but if you used an enterprise ready method of deploying SAV in the first place, deploying a patch isn’t that difficult. The biggest problem I expect is the user revolt that requiring another reboot will cause.