Vulnerabilites related to symantec - norton_antispam
Vulnerability from fkie_nvd
Published
2004-04-15 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antispam | 2004 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "matchCriteriaId": "EA28BC22-ABF0-4F1E-BA83-85B398775450", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la pila en el componente ActiveX SymSpamHelper (symspam.dll) en Norton AntiSpam 2004, usado en Norton Internet Security 2004, permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un par\u00e1metro largo en el m\u00e9todo LaunchCustomRuleWizard." } ], "id": "CVE-2004-0363", "lastModified": "2024-11-20T23:48:25.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-04-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107970870606638\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107980262324362\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/11169" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/344718" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.nextgenss.com/advisories/antispam.txt" }, { "source": "cve@mitre.org", "url": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9916" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107970870606638\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107980262324362\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/11169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/344718" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.nextgenss.com/advisories/antispam.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15536" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-16 21:19
Modified
2024-11-21 00:28
Severity ?
Summary
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*", "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:*:*:*:*:*:*", "matchCriteriaId": "5F68FB11-C830-4579-A29D-0E2A57CDE9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*", "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "251E7DE8-4485-438E-B62D-1BF508ECCCF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "742DB20E-AB26-4CF4-A383-BDCF3FBA448F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5E4BCD7-E441-417A-8C52-E1DE80AD67CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*", "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A0AFF82-E613-40E2-AAD5-37241294D981", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100:*:*:*:*:*:*:*", "matchCriteriaId": "69E9F1EE-CB23-42DE-8787-7F477D16329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*", "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C7FF193-6B91-4ED7-AF00-1D201C98BAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*", "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_scf_7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2D813-C219-4FF3-9C3B-DBB855480492", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_stm_build_9.0.0.338:*:*:*:*:*:*:*", "matchCriteriaId": "A5A00A25-A52F-4E9D-AAD0-194171C772FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5324D40A-76EA-4CC4-A1B1-971069A4E161", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*", "matchCriteriaId": "E651C9BE-201B-4DDC-A650-F9269531290C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "56EA0BAC-ED6D-45D2-995C-18B828906E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*", "matchCriteriaId": "17110872-8BD5-4CB0-9F2A-B18D091A7EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*", "matchCriteriaId": "9D29AD07-6545-4180-8E32-C18586684845", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:3.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "2D76AF2F-3DBA-4E78-B999-08F2302CFB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "2860637E-6FA5-445A-86B5-E9F2D2D7DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "018D1F3B-BAFC-461E-B833-9E0F98A6533D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "4B9AED5E-2D66-4EB2-95CC-158D909AAE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "19859DA5-66FB-4CFB-8FC4-0825E38C0381", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C86261D8-47C4-4476-925E-71E961A5242A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate:*:*:*:*:*", "matchCriteriaId": "7544F4F3-D3A8-4814-9727-6077542FC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate:*:*:*:*:*", "matchCriteriaId": "A5994802-8D88-4492-9CA3-D6263A78DC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*", "matchCriteriaId": "88090CD5-A324-4A41-A55E-9381FBC14B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*", "matchCriteriaId": "78E79E4D-E93B-4C6C-92EE-1E33EE1AEB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*", "matchCriteriaId": "F6E6EC72-9B83-4685-B48E-25E4211EC280", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "matchCriteriaId": "275187A5-FB3A-41C2-A6F4-F2DC9D88D0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*", "matchCriteriaId": "A7F0C0E9-9665-452E-A382-04656F2009AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "matchCriteriaId": "6A220194-CCB1-41F6-9CB0-A79C2E5E36FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*", "matchCriteriaId": "4D3CBEF5-25C6-41E8-97A3-2AA43134E619", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "DA2BB94A-9561-4B92-8BEF-1377E77D2A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate:*:*:*:*:*", "matchCriteriaId": "7EF25D8D-CE96-43B7-BA96-7AF61D0514D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate:*:*:*:*:*", "matchCriteriaId": "E344EFB5-A340-4226-B79B-CB0DB824BA9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate:*:*:*:*:*", "matchCriteriaId": "4AB33BC0-813C-4944-9835-A1F62614CC97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*", "matchCriteriaId": "423C4F6C-4D87-4604-9122-02E2F06FAFB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate:*:*:*:*:*", "matchCriteriaId": "60BBE26A-E648-440F-9F08-AA7DD62D6C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4EBBB8F-C17F-4E15-ADA6-1E8E572954BF", "versionEndIncluding": "2006_9.1.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." }, { "lang": "es", "value": "El controlador de dispositivo SymTDI (SYMTDI.SYS) en Symantec Norton Personal Firewall 2006 versi\u00f3n 9.1.1.7 y anteriores, Internet Security 2005 y 2006, AntiVirus Corporate Edition versi\u00f3n 3.0.x hasta 10.1.x, y otros productos Norton, permiten a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo de sistema) al enviar datos creados al archivo \\Device del controlador, que activa un acceso a la memoria no v\u00e1lido, una vulnerabilidad diferente a la CVE-2006-4855." } ], "id": "CVE-2007-1476", "lastModified": "2024-11-21T00:28:24.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-16T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35088" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2438" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018656" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22977" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-15 21:30
Modified
2024-11-21 00:33
Severity ?
Summary
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | client_security | 2.0 | |
symantec | client_security | 3.0 | |
symantec | client_security | 3.1 | |
symantec | norton_antispam | 2005 | |
symantec | norton_antivirus | 9.0 | |
symantec | norton_antivirus | 9.0.0.338 | |
symantec | norton_antivirus | 9.0.1 | |
symantec | norton_antivirus | 9.0.1.1.1000 | |
symantec | norton_antivirus | 9.0.1.1000 | |
symantec | norton_antivirus | 9.0.2 | |
symantec | norton_antivirus | 9.0.2.1000 | |
symantec | norton_antivirus | 9.0.3.1000 | |
symantec | norton_antivirus | 9.0.4 | |
symantec | norton_antivirus | 9.0.5 | |
symantec | norton_antivirus | 9.0.5.1100 | |
symantec | norton_antivirus | 10.0 | |
symantec | norton_antivirus | 10.1 | |
symantec | norton_antivirus | 2005 | |
symantec | norton_antivirus | 2006 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_personal_firewall | 2005 | |
symantec | norton_personal_firewall | 2006 | |
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "2860637E-6FA5-445A-86B5-E9F2D2D7DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "018D1F3B-BAFC-461E-B833-9E0F98A6533D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "4B9AED5E-2D66-4EB2-95CC-158D909AAE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." }, { "lang": "es", "value": "Symantec symtdi.sys versiones anteriores a 7.0.0, tal y como se distribuye en Symantec AntiVirus Corporate Edition 9 hata 10.1 y Client Security 2.0 hasta 3.1, Norton AntiSpam 2005, y Norton AntiVirus, Internet Security, Personal Firewall, y System Works 2005 y 2006; permite a usuarios locales obtener privilegios mediante un Interrupt Request Packet (Irp) manipulado en una petici\u00f3n IOCTL 0x83022323 a \\\\symTDI\\, que resulta en una sobre-escritura de memoria." } ], "id": "CVE-2007-3673", "lastModified": "2024-11-21T00:33:47.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-15T21:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26042" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018372" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22351" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-07-07 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | client_firewall | 5.01 | |
symantec | client_firewall | 5.1.1 | |
symantec | client_security | 1.0 | |
symantec | client_security | 1.1 | |
symantec | client_security | 1.2 | |
symantec | client_security | 1.3 | |
symantec | client_security | 1.4 | |
symantec | client_security | 1.5 | |
symantec | client_security | 1.6 | |
symantec | client_security | 1.7 | |
symantec | client_security | 1.8 | |
symantec | client_security | 1.9 | |
symantec | client_security | 2.0 | |
symantec | norton_antispam | 2004 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_personal_firewall | 2002 | |
symantec | norton_personal_firewall | 2003 | |
symantec | norton_personal_firewall | 2004 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_firewall:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "4AEFBAEB-18D4-4082-9F19-C47113841C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6EA9657C-14D2-418A-AABD-96392E87F4B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1DFD4CB-40A1-4D70-97AC-0941826F28CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7483F6DD-EDC0-497E-A5A9-B186E02CCCEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "102D0C6A-31B8-4275-A805-4CA446D1C77F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EA18147D-E618-4902-8837-5824240DD50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "75D357CC-EAD0-42E3-B38C-BE2DC44D154E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "201403B4-3B5C-4F77-ADAE-7A553D4D58F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A8D19926-AB65-4C06-8C44-7EA9B070FD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F27E94F-F6D6-4C40-878F-BF952658A909", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3AA71038-2D4E-4366-A3D1-AD85251B3E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "CC689F12-84C6-4B52-970F-DAF6B00B4A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "matchCriteriaId": "EA28BC22-ABF0-4F1E-BA83-85B398775450", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:*:*:*:*:*:*", "matchCriteriaId": "F05FEBA2-33E8-4074-8B57-4FE6FFEF2F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:*", "matchCriteriaId": "A5FA0458-AB41-495E-B41F-C18B4E6876CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "AEF97C5F-3A80-4973-85FD-5BCE43B32AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:*", "matchCriteriaId": "1F0BF645-7C56-4ED6-91C0-AE4CFAB62EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:*", "matchCriteriaId": "D7875372-44D7-47AB-8F8C-4A3AB98FB3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*", "matchCriteriaId": "898D5369-E2F3-450C-8554-1C692EAA9906", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*", "matchCriteriaId": "74E5CAF7-C305-4FAF-8DA7-627D83F65185", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself." }, { "lang": "es", "value": "El controlador SYMDNS.SYS de Symantec Norton Internet Security y Professional 2002 a 2004, Norton Personal Firewall 2002 a 2004, Norton AntiSpam 2004, Client Firewall 5.01 y 5.1.1, Client Securiy 1.0 a 2.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumici\u00f3n de CPU en un buble infinito) mediante una respuesta DNS con un puntero de nombre comprimido que apunta a s\u00ed mismo." } ], "id": "CVE-2004-0445", "lastModified": "2024-11-20T23:48:36.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2004-07-07T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/11066" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010144" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010145" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010146" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/682110" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6100" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10336" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/11066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/682110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-07-07 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | client_firewall | 5.01 | |
symantec | client_firewall | 5.1.1 | |
symantec | client_security | 1.0 | |
symantec | client_security | 1.1 | |
symantec | client_security | 1.2 | |
symantec | client_security | 1.3 | |
symantec | client_security | 1.4 | |
symantec | client_security | 1.5 | |
symantec | client_security | 1.6 | |
symantec | client_security | 1.7 | |
symantec | client_security | 1.8 | |
symantec | client_security | 1.9 | |
symantec | client_security | 2.0 | |
symantec | norton_antispam | 2004 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_personal_firewall | 2002 | |
symantec | norton_personal_firewall | 2003 | |
symantec | norton_personal_firewall | 2004 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_firewall:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "4AEFBAEB-18D4-4082-9F19-C47113841C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6EA9657C-14D2-418A-AABD-96392E87F4B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1DFD4CB-40A1-4D70-97AC-0941826F28CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7483F6DD-EDC0-497E-A5A9-B186E02CCCEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "102D0C6A-31B8-4275-A805-4CA446D1C77F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "EA18147D-E618-4902-8837-5824240DD50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "75D357CC-EAD0-42E3-B38C-BE2DC44D154E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "201403B4-3B5C-4F77-ADAE-7A553D4D58F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A8D19926-AB65-4C06-8C44-7EA9B070FD1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "0F27E94F-F6D6-4C40-878F-BF952658A909", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3AA71038-2D4E-4366-A3D1-AD85251B3E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "CC689F12-84C6-4B52-970F-DAF6B00B4A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "matchCriteriaId": "EA28BC22-ABF0-4F1E-BA83-85B398775450", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:*:*:*:*:*:*", "matchCriteriaId": "F05FEBA2-33E8-4074-8B57-4FE6FFEF2F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:*", "matchCriteriaId": "A5FA0458-AB41-495E-B41F-C18B4E6876CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "AEF97C5F-3A80-4973-85FD-5BCE43B32AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:*", "matchCriteriaId": "1F0BF645-7C56-4ED6-91C0-AE4CFAB62EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:*", "matchCriteriaId": "D7875372-44D7-47AB-8F8C-4A3AB98FB3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*", "matchCriteriaId": "898D5369-E2F3-450C-8554-1C692EAA9906", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*", "matchCriteriaId": "74E5CAF7-C305-4FAF-8DA7-627D83F65185", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components." }, { "lang": "es", "value": "M\u00faltiples vulenrabilidades en SYMDNS.SYS de Symantec Noton Internet Security y Professional 2002 a 2004, Norton Persnoal Firewall 2002 a 2004, Norton AntiSpam 2004, Client Firewal 5.01 y 5.1.1, y Client Security 1.0 a 2.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo de su elecci\u00f3n mediante \r\n(1) un byte de longitud manipulado en la rutina de decodificaci\u00f3n de primer nivel del Servicio de Nombres de NetBIOS (NBNS) que modifica una variable de \u00edndice que conduce a un desbordamiento de b\u00fafer en la pila,\r\n(2) un problema de corrupci\u00f3n del mont\u00f3n en una respuesta NBNS a la que le faltan ciertos campor RR, y \r\n(3) un desbordamiento de b\u00fafer basado en la pila en el componente DNS mediante un Registro de Recurso (RR) con un nombre can\u00f3nico (CNAME) largo compuest de muchos componentes m\u00e1s peque\u00f1os." } ], "id": "CVE-2004-0444", "lastModified": "2024-11-20T23:48:35.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-07-07T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/11066" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010144" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010145" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1010146" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/294998" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/634414" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/637318" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6099" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6101" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/6102" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10333" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10334" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/10335" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/11066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1010146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/294998" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/634414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/637318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/6102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/10335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-02 22:19
Modified
2024-11-21 00:29
Severity ?
Summary
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "EEB639EF-B434-42ED-A162-A2593FA78E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "5BA427D2-2F74-4314-B68A-164E2B6B0240", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "549049F7-2698-4F68-A1D0-1E4546B9EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "3E86D9CE-8A86-498B-B3A3-8988274A91E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "BBF13A92-83EF-44EE-AD87-BA0CF8FF266D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "D92B456D-A69E-4B10-8F74-D3DFC242F641", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*", "matchCriteriaId": "643AF180-138C-472A-8BC5-B8B028E77CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "0D56068D-CEF2-46B7-9914-36AB961839C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "C8ADDF27-67FF-41D7-BF2E-87AE06FDECD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*", "matchCriteriaId": "002290DD-589E-404F-BFC0-A1239D0E92E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*", "matchCriteriaId": "D2854BCF-2D37-4BE9-A590-7E25DF443EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*", "matchCriteriaId": "4BDB19A7-8DFA-43AD-9C44-16BBCF4531B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*", "matchCriteriaId": "ED683B68-530A-436F-A49B-32890EDFAC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*", "matchCriteriaId": "E651C9BE-201B-4DDC-A650-F9269531290C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "56EA0BAC-ED6D-45D2-995C-18B828906E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*", "matchCriteriaId": "17110872-8BD5-4CB0-9F2A-B18D091A7EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*", "matchCriteriaId": "9D29AD07-6545-4180-8E32-C18586684845", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_360:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "00819E08-CC5C-48FC-9F80-95B68AB19C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "matchCriteriaId": "EA28BC22-ABF0-4F1E-BA83-85B398775450", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C988B309-F397-412A-8570-C3823C7FE7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FA990FD5-DF2F-470A-936D-155A36BEDE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "692ECBCD-AB6B-4965-93F4-BDAD4777C018", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2008:*:*:*:*:*:*:*", "matchCriteriaId": "3EF87752-C86D-4C89-9DE9-F874068C89EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." }, { "lang": "es", "value": "El archivo SPBBCDrv.sys en Symantec Norton Personal Firewall 2006 versiones 9.1.0.33 y 9.1.1.7 no comprueba ciertos argumentos antes de ser pasado hacia los controladores de la funci\u00f3n SSDT enlazada, lo que permite a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo) o posiblemente ejecutar c\u00f3digo arbitrario por medio de argumentos creados para las funciones (1) NtCreateMutant y (2) NtOpenEvent. NOTA: m\u00e1s tarde se inform\u00f3 que Norton Internet Security 2008 versi\u00f3n 15.0.0.60, y posiblemente otras versiones de 2006, tambi\u00e9n se ven afectados." } ], "id": "CVE-2007-1793", "lastModified": "2024-11-21T00:29:10.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-02T22:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/34692" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24677" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23241" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017837" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017838" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021386" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021387" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021388" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021389" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2007-1476
Vulnerability from cvelistv5
Published
2007-03-16 21:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855.
References
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/avcenter/security/Content/2007.09.05.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/462926/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=full-disclosure&m=117396596027148&w=2 | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33003 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22977 | vdb-entry, x_refsource_BID | |
http://osvdb.org/35088 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/2438 | third-party-advisory, x_refsource_SREASON | |
http://securitytracker.com/id?1018656 | vdb-entry, x_refsource_SECTRACK | |
http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35088" }, { "name": "2438", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018656" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35088" }, { "name": "2438", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018656" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "refsource": "OSVDB", "url": "http://osvdb.org/35088" }, { "name": "2438", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018656" }, { "name": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1476", "datePublished": "2007-03-16T21:00:00", "dateReserved": "2007-03-16T00:00:00", "dateUpdated": "2024-08-07T12:59:08.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0445
Vulnerability from cvelistv5
Published
2004-05-20 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1010146 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1010145 | vdb-entry, x_refsource_SECTRACK | |
http://www.ciac.org/ciac/bulletins/o-141.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
http://www.kb.cert.org/vuls/id/682110 | third-party-advisory, x_refsource_CERT-VN | |
http://www.osvdb.org/6100 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16132 | vdb-entry, x_refsource_XF | |
http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html | x_refsource_CONFIRM | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html | mailing-list, x_refsource_FULLDISC | |
http://securitytracker.com/id?1010144 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/11066 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/10336 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1010146", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010145" }, { "name": "O-141", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "VU#682110", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/682110" }, { "name": "6100", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6100" }, { "name": "symantec-firewall-dns-dos(16132)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "20040512 EEYE: Symantec Multiple Firewall DNS Response Denial-of-Service", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html" }, { "name": "1010144", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010144" }, { "name": "11066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11066" }, { "name": "10336", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10336" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1010146", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010145" }, { "name": "O-141", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "VU#682110", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/682110" }, { "name": "6100", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6100" }, { "name": "symantec-firewall-dns-dos(16132)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "20040512 EEYE: Symantec Multiple Firewall DNS Response Denial-of-Service", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html" }, { "name": "1010144", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010144" }, { "name": "11066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11066" }, { "name": "10336", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10336" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0445", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1010146", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010145" }, { "name": "O-141", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "VU#682110", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/682110" }, { "name": "6100", "refsource": "OSVDB", "url": "http://www.osvdb.org/6100" }, { "name": "symantec-firewall-dns-dos(16132)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "20040512 EEYE: Symantec Multiple Firewall DNS Response Denial-of-Service", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html" }, { "name": "1010144", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010144" }, { "name": "11066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11066" }, { "name": "10336", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10336" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0445", "datePublished": "2004-05-20T04:00:00", "dateReserved": "2004-05-04T00:00:00", "dateUpdated": "2024-08-08T00:17:14.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3673
Vulnerability from cvelistv5
Published
2007-07-15 21:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26042 | third-party-advisory, x_refsource_SECUNIA | |
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35347 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22351 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2007/2507 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/36117 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1018372 | vdb-entry, x_refsource_SECTRACK | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:51.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26042", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26042" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36117" }, { "name": "1018372", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26042", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26042" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36117" }, { "name": "1018372", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3673", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26042", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26042" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "refsource": "OSVDB", "url": "http://osvdb.org/36117" }, { "name": "1018372", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3673", "datePublished": "2007-07-15T21:00:00", "dateReserved": "2007-07-10T00:00:00", "dateUpdated": "2024-08-07T14:28:51.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0363
Vulnerability from cvelistv5
Published
2004-03-23 05:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=107980262324362&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/11169 | third-party-advisory, x_refsource_SECUNIA | |
http://www.nextgenss.com/advisories/antispam.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15536 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=107970870606638&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.kb.cert.org/vuls/id/344718 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/9916 | vdb-entry, x_refsource_BID | |
http://www.sarc.com/avcenter/security/Content/2004.03.19.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040319 Ref: NGSSoftware Advisories NISR19042004a and NISR19042004b", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107980262324362\u0026w=2" }, { "name": "11169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11169" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nextgenss.com/advisories/antispam.txt" }, { "name": "nas-launchcustomrulewizard-bo(15536)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15536" }, { "name": "20040319 Norton AntiSpam Remote Buffer Overrun (#NISR19042004a)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107970870606638\u0026w=2" }, { "name": "VU#344718", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/344718" }, { "name": "9916", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9916" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040319 Ref: NGSSoftware Advisories NISR19042004a and NISR19042004b", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107980262324362\u0026w=2" }, { "name": "11169", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11169" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nextgenss.com/advisories/antispam.txt" }, { "name": "nas-launchcustomrulewizard-bo(15536)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15536" }, { "name": "20040319 Norton AntiSpam Remote Buffer Overrun (#NISR19042004a)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107970870606638\u0026w=2" }, { "name": "VU#344718", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/344718" }, { "name": "9916", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9916" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SymSpamHelper ActiveX component (symspam.dll) in Norton AntiSpam 2004, as used in Norton Internet Security 2004, allows remote attackers to execute arbitrary code via a long parameter to the LaunchCustomRuleWizard method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040319 Ref: NGSSoftware Advisories NISR19042004a and NISR19042004b", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107980262324362\u0026w=2" }, { "name": "11169", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11169" }, { "name": "http://www.nextgenss.com/advisories/antispam.txt", "refsource": "MISC", "url": "http://www.nextgenss.com/advisories/antispam.txt" }, { "name": "nas-launchcustomrulewizard-bo(15536)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15536" }, { "name": "20040319 Norton AntiSpam Remote Buffer Overrun (#NISR19042004a)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107970870606638\u0026w=2" }, { "name": "VU#344718", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/344718" }, { "name": "9916", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9916" }, { "name": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html", "refsource": "CONFIRM", "url": "http://www.sarc.com/avcenter/security/Content/2004.03.19.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0363", "datePublished": "2004-03-23T05:00:00", "dateReserved": "2004-03-19T00:00:00", "dateUpdated": "2024-08-08T00:17:14.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1793
Vulnerability from cvelistv5
Published
2007-04-02 22:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:26.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1192", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021389" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34692" }, { "name": "1017838", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1192", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021389" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34692" }, { "name": "1017838", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1192", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "name": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021389" }, { "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "name": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php", "refsource": "MISC", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "refsource": "OSVDB", "url": "http://osvdb.org/34692" }, { "name": "1017838", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1793", "datePublished": "2007-04-02T22:00:00", "dateReserved": "2007-04-02T00:00:00", "dateUpdated": "2024-08-07T13:06:26.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0444
Vulnerability from cvelistv5
Published
2004-05-20 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6099", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6099" }, { "name": "VU#634414", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/634414" }, { "name": "1010146", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010145" }, { "name": "VU#637318", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/637318" }, { "name": "10335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10335" }, { "name": "O-141", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html" }, { "name": "VU#294998", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/294998" }, { "name": "10333", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10333" }, { "name": "symantec-nbns-response-bo(16134)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134" }, { "name": "20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html" }, { "name": "6101", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6101" }, { "name": "6102", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/6102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "symantec-dns-response-bo(16137)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137" }, { "name": "1010144", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1010144" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html" }, { "name": "10334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10334" }, { "name": "11066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11066" }, { "name": "symantec-firewalls-nbns-bo(16135)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6099", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6099" }, { "name": "VU#634414", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/634414" }, { "name": "1010146", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010145" }, { "name": "VU#637318", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/637318" }, { "name": "10335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10335" }, { "name": "O-141", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html" }, { "name": "VU#294998", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/294998" }, { "name": "10333", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10333" }, { "name": "symantec-nbns-response-bo(16134)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134" }, { "name": "20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html" }, { "name": "6101", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6101" }, { "name": "6102", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/6102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "symantec-dns-response-bo(16137)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137" }, { "name": "1010144", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1010144" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html" }, { "name": "10334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10334" }, { "name": "11066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11066" }, { "name": "symantec-firewalls-nbns-bo(16135)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0444", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6099", "refsource": "OSVDB", "url": "http://www.osvdb.org/6099" }, { "name": "VU#634414", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/634414" }, { "name": "1010146", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010146" }, { "name": "1010145", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010145" }, { "name": "VU#637318", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/637318" }, { "name": "10335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10335" }, { "name": "O-141", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html" }, { "name": "VU#294998", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/294998" }, { "name": "10333", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10333" }, { "name": "symantec-nbns-response-bo(16134)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134" }, { "name": "20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html" }, { "name": "6101", "refsource": "OSVDB", "url": "http://www.osvdb.org/6101" }, { "name": "6102", "refsource": "OSVDB", "url": "http://www.osvdb.org/6102" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html" }, { "name": "symantec-dns-response-bo(16137)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137" }, { "name": "1010144", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1010144" }, { "name": "20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html" }, { "name": "10334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10334" }, { "name": "11066", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11066" }, { "name": "symantec-firewalls-nbns-bo(16135)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0444", "datePublished": "2004-05-20T04:00:00", "dateReserved": "2004-05-04T00:00:00", "dateUpdated": "2024-08-08T00:17:14.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }