Vulnerabilites related to symantec - norton_system_works
Vulnerability from fkie_nvd
Published
2007-03-16 21:19
Modified
2024-11-21 00:28
Severity ?
Summary
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*", "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:*:*:*:*:*:*", "matchCriteriaId": "5F68FB11-C830-4579-A29D-0E2A57CDE9FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*", "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "251E7DE8-4485-438E-B62D-1BF508ECCCF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "742DB20E-AB26-4CF4-A383-BDCF3FBA448F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5E4BCD7-E441-417A-8C52-E1DE80AD67CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*", "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "6A0AFF82-E613-40E2-AAD5-37241294D981", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100:*:*:*:*:*:*:*", "matchCriteriaId": "69E9F1EE-CB23-42DE-8787-7F477D16329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*", "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C7FF193-6B91-4ED7-AF00-1D201C98BAFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*", "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_scf_7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2D813-C219-4FF3-9C3B-DBB855480492", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_stm_build_9.0.0.338:*:*:*:*:*:*:*", "matchCriteriaId": "A5A00A25-A52F-4E9D-AAD0-194171C772FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5324D40A-76EA-4CC4-A1B1-971069A4E161", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*", "matchCriteriaId": "E651C9BE-201B-4DDC-A650-F9269531290C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "56EA0BAC-ED6D-45D2-995C-18B828906E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*", "matchCriteriaId": "17110872-8BD5-4CB0-9F2A-B18D091A7EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*", "matchCriteriaId": "9D29AD07-6545-4180-8E32-C18586684845", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:3.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "2D76AF2F-3DBA-4E78-B999-08F2302CFB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "2860637E-6FA5-445A-86B5-E9F2D2D7DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "018D1F3B-BAFC-461E-B833-9E0F98A6533D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "4B9AED5E-2D66-4EB2-95CC-158D909AAE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "19859DA5-66FB-4CFB-8FC4-0825E38C0381", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C86261D8-47C4-4476-925E-71E961A5242A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate:*:*:*:*:*", "matchCriteriaId": "7544F4F3-D3A8-4814-9727-6077542FC404", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate:*:*:*:*:*", "matchCriteriaId": "A5994802-8D88-4492-9CA3-D6263A78DC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*", "matchCriteriaId": "88090CD5-A324-4A41-A55E-9381FBC14B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*", "matchCriteriaId": "78E79E4D-E93B-4C6C-92EE-1E33EE1AEB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*", "matchCriteriaId": "F6E6EC72-9B83-4685-B48E-25E4211EC280", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "matchCriteriaId": "275187A5-FB3A-41C2-A6F4-F2DC9D88D0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*", "matchCriteriaId": "A7F0C0E9-9665-452E-A382-04656F2009AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "matchCriteriaId": "6A220194-CCB1-41F6-9CB0-A79C2E5E36FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*", "matchCriteriaId": "4D3CBEF5-25C6-41E8-97A3-2AA43134E619", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "DA2BB94A-9561-4B92-8BEF-1377E77D2A31", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate:*:*:*:*:*", "matchCriteriaId": "7EF25D8D-CE96-43B7-BA96-7AF61D0514D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate:*:*:*:*:*", "matchCriteriaId": "E344EFB5-A340-4226-B79B-CB0DB824BA9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate:*:*:*:*:*", "matchCriteriaId": "4AB33BC0-813C-4944-9835-A1F62614CC97", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate:*:*:*:*:*", "matchCriteriaId": "423C4F6C-4D87-4604-9122-02E2F06FAFB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate:*:*:*:*:*", "matchCriteriaId": "60BBE26A-E648-440F-9F08-AA7DD62D6C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4EBBB8F-C17F-4E15-ADA6-1E8E572954BF", "versionEndIncluding": "2006_9.1.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." }, { "lang": "es", "value": "El controlador de dispositivo SymTDI (SYMTDI.SYS) en Symantec Norton Personal Firewall 2006 versi\u00f3n 9.1.1.7 y anteriores, Internet Security 2005 y 2006, AntiVirus Corporate Edition versi\u00f3n 3.0.x hasta 10.1.x, y otros productos Norton, permiten a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo de sistema) al enviar datos creados al archivo \\Device del controlador, que activa un acceso a la memoria no v\u00e1lido, una vulnerabilidad diferente a la CVE-2006-4855." } ], "id": "CVE-2007-1476", "lastModified": "2024-11-21T00:28:24.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-16T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35088" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2438" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018656" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22977" }, { "source": "cve@mitre.org", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35088" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-02-03 05:00
Modified
2024-11-20 23:46
Severity ?
Summary
The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antivirus | 2.1 | |
symantec | norton_antivirus | 2001 | |
symantec | norton_antivirus | 2001 | |
symantec | norton_antivirus | 2002 | |
symantec | norton_antivirus | 2002 | |
symantec | norton_antivirus | 2003 | |
symantec | norton_antivirus | 2003 | |
symantec | norton_antivirus | 2004 | |
symantec | norton_antivirus | v3.0 | |
symantec | norton_internet_security | 2001 | |
symantec | norton_internet_security | 2001 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2002 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2003 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_system_works | 2001 | |
symantec | norton_system_works | 2002 | |
symantec | norton_system_works | 2003 | |
symantec | norton_system_works | 2004 | |
symantec | windows_liveupdate | 1.70.x | |
symantec | windows_liveupdate | 1.90.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "A9415109-C554-40F6-851E-CC016951BDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2001:*:*:*:*:*:*:*", "matchCriteriaId": "19595AF4-8C85-4646-B42B-4B5863798AB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2001:*:pro:*:*:*:*:*", "matchCriteriaId": "532CF7E7-2F8A-4AC2-91F4-C8D35B8943EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2002:*:*:*:*:*:*:*", "matchCriteriaId": "8F6F3B3C-7C60-4A38-91F0-E09148DB4FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2002:*:pro:*:*:*:*:*", "matchCriteriaId": "BFFF5F92-2CB6-4155-91AA-B80476509376", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34B1D862-2CB4-4D50-9BBA-0507FEAA1924", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:pro:*:*:*:*:*", "matchCriteriaId": "C1538C84-EB7B-407C-9B05-27B9B0A10F16", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:pro:*:*:*:*:*", "matchCriteriaId": "486AF3E7-B5EC-49D2-9822-0F8E152DEDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:v3.0:*:handhelds:*:*:*:*:*", "matchCriteriaId": "7980AED6-1CB7-46C0-AD67-238B4A18060B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2001:*:*:*:*:*:*:*", "matchCriteriaId": "2D2C8E23-852E-4715-9D8D-18F26B1263A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2001:*:pro:*:*:*:*:*", "matchCriteriaId": "DBF82809-CE59-4B2A-89C0-FB1AF760704E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:*:*:*:*:*:*", "matchCriteriaId": "F05FEBA2-33E8-4074-8B57-4FE6FFEF2F32", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:*", "matchCriteriaId": "A5FA0458-AB41-495E-B41F-C18B4E6876CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "AEF97C5F-3A80-4973-85FD-5BCE43B32AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:*", "matchCriteriaId": "1F0BF645-7C56-4ED6-91C0-AE4CFAB62EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:*", "matchCriteriaId": "D7875372-44D7-47AB-8F8C-4A3AB98FB3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2001:*:*:*:*:*:*:*", "matchCriteriaId": "B37463FB-DA25-43F4-BB92-50354DF5A8C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2002:*:*:*:*:*:*:*", "matchCriteriaId": "4BCEEC08-41F6-423A-B845-541227B64CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2003:*:*:*:*:*:*:*", "matchCriteriaId": "A4C31257-E62D-495D-9F7B-09D234B7BF64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:windows_liveupdate:1.70.x:*:*:*:*:*:*:*", "matchCriteriaId": "6118EFBA-C50B-4790-B301-5B996F759105", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:windows_liveupdate:1.90.x:*:*:*:*:*:*:*", "matchCriteriaId": "247F0A9D-E8E4-484A-99AA-4368B84F702B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges." }, { "lang": "es", "value": "La funcionalidad gui para una sesi\u00f3n interactiva en ymantec LiveUpdate 1.70.x hasta la 1.90.x (usadas en Norton Internet Security 2001 hasta 2004, SystemWorks 2001 hasta 2004, y AntiVirus y Norton AntiVirus Pro 2001 hasta 2004, AntiVirus for Handhelds v3.0) permite que usuarios locales obtengan privilegios SYSTEM." } ], "id": "CVE-2003-0994", "lastModified": "2024-11-20T23:46:06.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-02-03T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107393473928245\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/3428" }, { "source": "cve@mitre.org", "url": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107393473928245\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/3428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-19 16:06
Modified
2024-11-21 00:09
Severity ?
Summary
Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | liveupdate | 3.0 | |
symantec | liveupdate | 3.0.1 | |
symantec | liveupdate | 3.0.2 | |
symantec | liveupdate | 3.0.3 | |
symantec | liveupdate | 3.5 | |
symantec | norton_antivirus | 9.0.0 | |
symantec | norton_antivirus | 9.0.1 | |
symantec | norton_antivirus | 9.0.2 | |
symantec | norton_antivirus | 9.0.3 | |
symantec | norton_antivirus | 10.0 | |
symantec | norton_antivirus | 10.0.0 | |
symantec | norton_antivirus | 10.0.1 | |
symantec | norton_antivirus | 10.9.1 | |
symantec | norton_internet_security | 3.0 | |
symantec | norton_personal_firewall | 3.0 | |
symantec | norton_personal_firewall | 3.1 | |
symantec | norton_system_works | 3.0 | |
symantec | norton_utilities | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:liveupdate:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "05EE17B2-8E91-4413-A35A-183C3000B6A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:liveupdate:3.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "FB2DE1ED-01B8-42A1-BA70-BA15328B2E6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:liveupdate:3.0.2:*:macintosh:*:*:*:*:*", "matchCriteriaId": "B3F2C272-73E6-4D07-A72D-145A6BF1818C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:liveupdate:3.0.3:*:macintosh:*:*:*:*:*", "matchCriteriaId": "50D20D8E-A7D7-4DD6-9918-2E609A7D7620", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:liveupdate:3.5:*:macintosh:*:*:*:*:*", "matchCriteriaId": "749C0B32-9669-4CD6-8615-BCD76C768532", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "E72D8D65-340C-4505-AA80-F9E7870513EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "242D33E8-1B6B-4562-9F2A-1B34E3B7BC71", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:macintosh:*:*:*:*:*", "matchCriteriaId": "252ACD1B-323F-4139-880D-89D600F29986", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3:*:macintosh:*:*:*:*:*", "matchCriteriaId": "B2D0922A-3EA3-4BC9-9311-9DCA57338CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "7225A578-8F62-42BD-99AC-D3385478613A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "FF0903BD-3E78-4024-A773-16100F519B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "1B390577-F1F1-4821-90FB-967E749F7CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.9.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "44073E2A-A8AB-4D1A-BCFC-8439E40E97E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "D2259605-B720-42B0-8476-6CAE07C7B143", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "9CC3459D-1F86-48A4-9DC2-0E542AEAC97D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:3.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "608F8ECE-F8A9-4659-9ED7-79ADD61E5099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "F648A08A-24EF-45A5-B7FD-00CAD5892061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_utilities:8.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "DCB3EF92-1CEA-4E57-94E7-0C596998F4CF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program." } ], "id": "CVE-2006-1836", "lastModified": "2024-11-21T00:09:52.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-19T16:06:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19682" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/100" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015953" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/17571" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19682" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-15 21:30
Modified
2024-11-21 00:33
Severity ?
Summary
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | client_security | 2.0 | |
symantec | client_security | 3.0 | |
symantec | client_security | 3.1 | |
symantec | norton_antispam | 2005 | |
symantec | norton_antivirus | 9.0 | |
symantec | norton_antivirus | 9.0.0.338 | |
symantec | norton_antivirus | 9.0.1 | |
symantec | norton_antivirus | 9.0.1.1.1000 | |
symantec | norton_antivirus | 9.0.1.1000 | |
symantec | norton_antivirus | 9.0.2 | |
symantec | norton_antivirus | 9.0.2.1000 | |
symantec | norton_antivirus | 9.0.3.1000 | |
symantec | norton_antivirus | 9.0.4 | |
symantec | norton_antivirus | 9.0.5 | |
symantec | norton_antivirus | 9.0.5.1100 | |
symantec | norton_antivirus | 10.0 | |
symantec | norton_antivirus | 10.1 | |
symantec | norton_antivirus | 2005 | |
symantec | norton_antivirus | 2006 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_personal_firewall | 2005 | |
symantec | norton_personal_firewall | 2006 | |
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "2860637E-6FA5-445A-86B5-E9F2D2D7DD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "018D1F3B-BAFC-461E-B833-9E0F98A6533D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "4B9AED5E-2D66-4EB2-95CC-158D909AAE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." }, { "lang": "es", "value": "Symantec symtdi.sys versiones anteriores a 7.0.0, tal y como se distribuye en Symantec AntiVirus Corporate Edition 9 hata 10.1 y Client Security 2.0 hasta 3.1, Norton AntiSpam 2005, y Norton AntiVirus, Internet Security, Personal Firewall, y System Works 2005 y 2006; permite a usuarios locales obtener privilegios mediante un Interrupt Request Packet (Irp) manipulado en una petici\u00f3n IOCTL 0x83022323 a \\\\symTDI\\, que resulta en una sobre-escritura de memoria." } ], "id": "CVE-2007-3673", "lastModified": "2024-11-21T00:33:47.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-15T21:30:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36117" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26042" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018372" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22351" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/22351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:57
Severity ?
Summary
Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | antivirus_scan_engine | 4.3.7.27 | |
symantec | mail_security | 4.0.5.66 | |
symantec | mail_security | 4.5.4.743 | |
symantec | norton_antivirus | 2005_11.0.0 | |
symantec | norton_internet_security | 2005_contains_nav_11.0.0 | |
symantec | norton_system_works | 2005_contains_nav_11.0.0 | |
symantec | symav_filter_domino_nt | 3.1.1.87 | |
symantec | web_security | 3.0.1.72 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.7.27:*:*:*:*:*:*:*", "matchCriteriaId": "51170553-03E8-4588-97A0-8DA57C37B5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0.5.66:*:smtp:*:*:*:*:*", "matchCriteriaId": "111FA175-C681-4524-AF08-1C65C44189CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5.4.743:*:exchange:*:*:*:*:*", "matchCriteriaId": "AF7B2BEA-4030-4360-ABA6-8DF44DB67E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005_11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4AEBDC11-A174-4974-8D57-469CD9C749C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005_contains_nav_11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7FE1A0A-4352-459A-892D-29AB14AA3B00", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_contains_nav_11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB2DC849-2C1D-43B5-B9A9-599DAA05EE8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:symav_filter_domino_nt:3.1.1.87:*:*:*:*:*:*:*", "matchCriteriaId": "54C8D211-9151-4D95-907E-19BD465C320E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.72:*:*:*:*:*:*:*", "matchCriteriaId": "47BC2FF9-A77F-46B8-A714-BBA08A81E5A2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file." } ], "id": "CVE-2005-1346", "lastModified": "2024-11-20T23:57:08.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-19 01:07
Modified
2024-11-21 00:19
Severity ?
Summary
Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | automated_support_assistant | * | |
symantec | norton_antivirus | * | |
symantec | norton_internet_security | 2006 | |
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:automated_support_assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B0CDB6-4DB2-4F75-B408-7E8EC39446FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A58C09D-72A0-48E1-ABF0-49EBECA5D02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el Control de ActiveX usado en Symantec Automated Support Assistant, como el usado en el AntiVirus Norton, en Internet Security y System Works 2005 y 2006, permite a los atacantes remotos, con la complicidad del usuario, obtener informaci\u00f3n sensible mediante vectores no especificados." } ], "id": "CVE-2006-5404", "lastModified": "2024-11-21T00:19:06.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-10-19T01:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22228" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016988" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016989" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016990" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016991" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20348" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/20348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29366" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-09 21:17
Modified
2024-11-21 00:32
Severity ?
Summary
Multiple unspecified "input validation error" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antivirus | 2006 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:anti_spyware:*:*:*:*:*", "matchCriteriaId": "803641B7-E099-4CE8-B805-DBB338479E23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified \"input validation error\" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de \"errores de validaci\u00f3n de entrada\" sin especificar en m\u00faltiples controles ActiveX en el NavComUI.dll, como el utilizado en el AntiVirus Norton, Internet Security y los productos System Works para 2006, permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de (1) la propiedad AnomalyList del AxSysListView32 y (2) la propiedad Anomaly del AxSysListView32OAA.\r\n" } ], "id": "CVE-2007-2955", "lastModified": "2024-11-21T00:32:03.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-08-09T21:17:00.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/25215" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-53/advisory/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/24983" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1018545" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1018546" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securitytracker.com/id?1018547" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2007/2822" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2007-53/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018547" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35944" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-02-08 05:00
Modified
2024-11-20 23:54
Severity ?
Summary
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "5797D88E-6D89-46F9-AC32-154754D6B856", "versionEndExcluding": "4.3.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "95436CD6-8E9C-4F89-9683-0650F6167027", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC910CFD-9F20-473E-BC2D-64A7A3C14404", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*", "matchCriteriaId": "BE15AE1D-8647-444F-90F0-FC658A3AC344", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*", "matchCriteriaId": "0C03FA86-F2E6-4E41-8368-E917C91D7837", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*", "matchCriteriaId": "95BF74F0-40F1-4395-AC85-E6B566950C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*", "matchCriteriaId": "994CB184-AFE8-4673-ACE8-085813F1E71F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*", "matchCriteriaId": "85CF6FFB-4189-4558-A70D-DE6D4C0C1F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*", "matchCriteriaId": "31D6A148-A92C-4FCA-8762-16764D62C363", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*", "matchCriteriaId": "3E6E2EA2-88DA-4DF0-9AA3-3E3D2C80C04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*", "matchCriteriaId": "FB47C16B-5221-4D64-BDB2-65D072A66C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*", "matchCriteriaId": "204F2046-F116-45D7-9256-179A3B59886A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*", "matchCriteriaId": "CD0C67C0-3CF1-4BAD-A673-9B783E1D0724", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*", "matchCriteriaId": "274EA5DA-9519-46DE-B11E-87BDF1978E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*", "matchCriteriaId": "044C020A-0BCC-4037-BC32-73385A0BE019", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:gateway_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A939A3CE-BFBB-4950-A0D3-D5731AABF602", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:gateway_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BC7324C-0415-4349-A625-04A8209D7709", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:gateway_security:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "031C9545-1CF1-46EF-B79C-7AD69E1B1C82", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*", "matchCriteriaId": "DA6CFDFD-1EB4-458A-AD39-320E619593D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build_458:exchange:*:*:*:*:*", "matchCriteriaId": "15436586-B0EE-40F4-9051-90953CF3684D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build_459:exchange:*:*:*:*:*", "matchCriteriaId": "96290C64-A507-46B6-908D-AD567A21899F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build_461:exchange:*:*:*:*:*", "matchCriteriaId": "2955A350-222F-4AD9-9745-9468D46503F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*", "matchCriteriaId": "5CA62889-7A55-459F-BFD8-D38CD93F9219", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.18_build_83:*:exchange:*:*:*:*:*", "matchCriteriaId": "3E906A81-4081-438E-948C-FC82BF7203F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*", "matchCriteriaId": "E626F14C-FDE9-4C6A-8CE7-B99CD4FEE485", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*", "matchCriteriaId": "EC4CFE5A-4D51-405D-B92E-37DE4E617ABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*", "matchCriteriaId": "727A116A-D18C-4F3F-A6A8-2C6107FFB8C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*", "matchCriteriaId": "4A6612F1-4CA8-427A-AED4-854F943BA3D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.434:*:corporate:*:*:*:*:*", "matchCriteriaId": "8BB225A0-7FB9-4AD2-8ED2-5CC1AEBAAB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.437:*:corporate:*:*:*:*:*", "matchCriteriaId": "9603C423-F24A-4607-B721-D02EDA94AE8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.446:*:corporate:*:*:*:*:*", "matchCriteriaId": "574AAAA6-8181-457B-84CE-5AEB1895E3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.457:*:corporate:*:*:*:*:*", "matchCriteriaId": "DF957AD3-B6E5-4BD7-832F-33E734817B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.460:*:corporate:*:*:*:*:*", "matchCriteriaId": "14D862F4-BE5F-4E6B-9955-ACFB48A5D3B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.464:*:corporate:*:*:*:*:*", "matchCriteriaId": "768B7F5E-E4AD-420E-92FA-A58E1AE3D1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.471:*:corporate:*:*:*:*:*", "matchCriteriaId": "C15B7FEA-E6A9-4DBE-B1A9-E17E91512A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh_corporate:*:*:*:*:*", "matchCriteriaId": "DFD3D01C-9169-4CFE-9EA0-61D32BFA8943", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:windows:*:*:*:*:*", "matchCriteriaId": "A7FC3B67-D36C-4C9F-B5DC-8FBE3D6E9E29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:windows:*:*:*:*:*", "matchCriteriaId": "676BCD67-231B-409B-AE6B-D00314C30C9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:sav_filter_domino_nt_ports:build3.0.5:*:aix:*:*:*:*:*", "matchCriteriaId": "20030FF8-7275-4AFB-A051-C78F3D3990D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:sav_filter_domino_nt_ports:build3.0.5:*:os_400:*:*:*:*:*", "matchCriteriaId": "4CD83506-91E9-4556-A993-8FDD31FBDF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:sav_filter_for_domino_nt:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4004DB50-022B-48C9-B9E5-5110DF37A0B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*", "matchCriteriaId": "B05B8522-E203-49A0-8C5B-3DA7B06AF5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*", "matchCriteriaId": "9FD064CE-3C39-4243-B59E-CC8E48ED50DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*", "matchCriteriaId": "9886B467-793C-4D07-9B1B-B80FA5266D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*", "matchCriteriaId": "676F5A96-B21B-49FF-86EA-F18F9C3931C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*", "matchCriteriaId": "18991132-C5B6-43AB-BDCB-196BB2957F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*", "matchCriteriaId": "42CE2596-83A9-4A80-A8C6-825EDEAAB8B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*", "matchCriteriaId": "CBA16BAF-6263-44EA-B3EB-187264913D8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header." } ], "id": "CVE-2005-0249", "lastModified": "2024-11-20T23:54:43.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-02-08T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1013133" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/107822" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/187" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1013133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/107822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18869" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-05 21:17
Modified
2024-11-21 00:25
Severity ?
Summary
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D2AD14C-2BD2-4658-BDB0-232A9E26EA2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:clearswift:*:*:*:*:*", "matchCriteriaId": "1E739083-DFC2-4A89-9F84-E067E127D420", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E65DC45B-8FA9-453E-8249-45535EA64D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA3717-A218-459B-891C-F3F945D42A22", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F11687CE-E997-4D26-ACAE-B9175348ADDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:caching:*:*:*:*:*", "matchCriteriaId": "2F90AD67-02CB-4006-B567-631FD633DB17", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:clearswift:*:*:*:*:*", "matchCriteriaId": "BC0F87D0-E4B5-41FC-8050-386B9CE04249", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:microsoft_sharepoint:*:*:*:*:*", "matchCriteriaId": "FBBFF303-3DD6-4312-94CD-37E5170A93AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:network_attached_storage:*:*:*:*:*", "matchCriteriaId": "59962A9A-10F4-4F1B-A5AB-8743C0874963", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "346F8C27-F389-412C-B7C2-2CF3344E557C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.7.27:*:*:*:*:*:*:*", "matchCriteriaId": "51170553-03E8-4588-97A0-8DA57C37B5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.8.29:*:*:*:*:*:*:*", "matchCriteriaId": "A32C5A4C-9E39-4718-8BF1-283183B4A516", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "301B1340-A402-4D3E-AAF8-17CD8B59517D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:caching:*:*:*:*:*", "matchCriteriaId": "52CE5595-323D-45A2-BD05-C6B2CBD6BA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:clearswift:*:*:*:*:*", "matchCriteriaId": "3042D5B7-AE27-4664-87DB-679422029199", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:messaging:*:*:*:*:*", "matchCriteriaId": "671CBE65-1FCF-43B8-8D21-5C8CC7C17417", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:microsoft_sharepoint:*:*:*:*:*", "matchCriteriaId": "28BD859A-F57B-444C-8083-AE99E59B9DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:network_attached_storage:*:*:*:*:*", "matchCriteriaId": "6158E16F-468A-4B76-8199-500FCAC1E54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "992DB720-52A8-43D4-B74B-96C0F763ED0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "685F58DC-6BD3-499C-A9D5-BB9C909FE857", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "95436CD6-8E9C-4F89-9683-0650F6167027", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC910CFD-9F20-473E-BC2D-64A7A3C14404", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "849782E0-9F26-411F-82B9-88B5FC4F4C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAD87DB3-45C2-4091-A83B-25E427563C70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0910781-9EF9-4188-AA33-1C54F01A0832", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7647813B-2B9F-4B0F-96D1-C533A49DDC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "09AD23D0-4502-4090-9172-002B92D83C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*", "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*", "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*", "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*", "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*", "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*", "matchCriteriaId": "DA6CFDFD-1EB4-458A-AD39-320E619593D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "05B85F14-4248-4550-BE7F-D9BAB9DC90C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build456:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "419D2E24-CA90-471D-9F35-1795F6A65B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build463:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "965DA3C4-7559-4583-A5DC-BEABEAA7E87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build465:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EBEB8E8E-DB27-45FB-90CA-2CF3A515AC4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build736:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "8184E073-37B0-4654-8DF8-379EFC5FB0D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build741:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "C29B7C1F-C4AB-4CAB-8177-B64F4B8A2B26", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build743:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "D1FBFE00-4692-48C2-A6C7-9179E185A275", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0.1:*:domino:*:*:*:*:*", "matchCriteriaId": "DBE74BFA-003E-40CC-83E1-1AC7159B0C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build458:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "E21CDCBA-3C86-462B-8383-58C893978EBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build459:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "E6179A68-2322-4D79-9446-5A5E4B27AD33", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build461:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EE92421B-C0CA-4B28-9E26-EF0A115C9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "DC8AD646-E257-4065-B358-8B4944D327E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5.4.743:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "F50BA510-67D5-4FF1-87D0-215B68D20EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*", "matchCriteriaId": "5CA62889-7A55-459F-BFD8-D38CD93F9219", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_736:*:exchange:*:*:*:*:*", "matchCriteriaId": "766327B9-E8DA-4422-80C2-48E333161D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_741:*:exchange:*:*:*:*:*", "matchCriteriaId": "3C5FF883-831F-47CC-BD04-BBFD25BDE8DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6.1.107:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "C6EAA83D-2073-4360-BD3C-59AF34EADE1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6.3:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "60D239DF-65AD-4492-AEE1-FCD36E99DD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6_build_97:*:exchange:*:*:*:*:*", "matchCriteriaId": "7AD92ABA-2D03-46FD-85D5-33FC369015DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:smtp:*:*:*:*:*", "matchCriteriaId": "96E660E2-C0F9-499F-A01D-DB368179F28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.204:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "8E1C4824-3774-41EF-80E1-42A417830978", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.1.0:*:domino:*:*:*:*:*", "matchCriteriaId": "A3D2C4B6-2F13-4487-989E-AC247D4D011A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:6.0.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "091D4557-21F6-412F-933A-9F0FD8152E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:corporate_edition_for_linux:*:*:*:*:*", "matchCriteriaId": "2CC0DE59-149C-42DD-9516-BDB79A9BC412", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "88FE6753-A619-4703-8120-F23EEC8C48EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "497635AC-D7F2-4A5C-8C37-DA493C9681A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "E72D8D65-340C-4505-AA80-F9E7870513EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "774AD674-895A-4242-9AC9-BAD6CB862785", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "242D33E8-1B6B-4562-9F2A-1B34E3B7BC71", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "C9797D21-CD64-4B61-A4C1-AC4AD3F9B3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:macintosh:*:*:*:*:*", "matchCriteriaId": "252ACD1B-323F-4139-880D-89D600F29986", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "618F6F78-566A-4901-8B57-BB6DCAC7E892", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3:*:macintosh:*:*:*:*:*", "matchCriteriaId": "B2D0922A-3EA3-4BC9-9311-9DCA57338CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "EB7F329F-4390-4735-B2C2-BC6A72FBE36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A5D058F6-779B-4ED4-ADC7-A68491F72BAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:mr4_build_1000:corporate_edition:*:*:*:*:*", "matchCriteriaId": "29E1AF72-6D48-4DAF-904A-B55366189251", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "4B5EE3B2-FF16-4231-B99D-81CB10239576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "7D26AB91-36AB-4BF6-9D0D-098F04C60AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "E5E0AB4E-4DD0-4D87-BBE5-B459A8B7301F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "4433613D-EB44-4D60-861F-F9FFA2ED4F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "7225A578-8F62-42BD-99AC-D3385478613A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "FF0903BD-3E78-4024-A773-16100F519B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0.359:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "BF18D806-E781-4F17-9341-D48CBC06949E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "1B390577-F1F1-4821-90FB-967E749F7CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "88AA69B4-865C-4959-9681-62A7591D6CFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "55EDC888-F593-49E8-95A4-87D8FE9CC09A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B7A47F4F-DC34-4B7D-9C3A-4631FFFC1142", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B70ACBE6-C754-4A6F-AC2F-89657DA179E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "8C6C2421-5651-4B3F-9DBC-DC411C989BE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "5B967B9A-215D-470A-9722-5782D0AE0980", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "F4BFDD98-F70E-41A9-9245-7EC5D140D4F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "DFC9BF64-65E7-4E0E-A637-13794A02CEED", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "6B188333-A087-4FC7-864B-F802932455F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A33A8A08-F356-4616-A603-00ADCC062D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B5889206-CE1C-489B-8984-EE4055BBC6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "62EA1AE0-6A8B-4C13-B95D-7F9694AD5535", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:mr4_mp1_build4010:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B31249CA-296D-42C2-8939-61B990559BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "5C6B6D3A-715A-45B9-8231-77A6DE847973", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "73A3CB7B-DD39-48E7-8D33-1E222933A7D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "116F0C9D-9255-4B98-B1CF-C78A96240784", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A8957B43-0673-439F-86F6-5791372BA498", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "D2ACD718-6232-463A-ACEE-B06A02D3243A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.9.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "44073E2A-A8AB-4D1A-BCFC-8439E40E97E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "3967227C-FCB1-486E-A6C4-43B8004C4A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "894F1929-1029-4B57-A66A-EA58F7D94D1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "C532E93A-5D0D-454D-8B14-F5E9C6A0499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "D2259605-B720-42B0-8476-6CAE07C7B143", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "F39AE3D7-7018-47AB-B332-D40EA5273CEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "82446BA3-92F9-4689-9D67-3CE159AA0F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.5.6.14:*:*:*:*:*:*", "matchCriteriaId": "98F9F2E3-1775-4EF9-9FE0-0D011307C269", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*", "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "F648A08A-24EF-45A5-B7FD-00CAD5892061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:premier:*:*:*:*:*", "matchCriteriaId": "CBB1521D-B16D-4E28-8723-AF96E95D7596", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "67EECA52-EECB-4AAA-85F9-ADBE028B8068", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "CE8022C6-360B-4A3D-AD70-3DC79B339231", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:symantec_antivirus_filtering_\\+for_domino:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "37AE8BC0-663C-4D1D-8FF5-13F682BBEE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "60B08F85-A0E6-4984-83E9-41CD29751BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "690F3A5F-F990-41C9-9964-B033188C86F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "43E4FAC8-2893-48FA-B159-49C8AA380338", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "5D37768F-A43C-420E-85CA-A5EF3E30F47F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.76:*:*:*:*:*:*:*", "matchCriteriaId": "ABE3F492-D08F-4558-BC19-F33BBB0D55A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.70:*:*:*:*:*:*:*", "matchCriteriaId": "B4CD5C31-4F4A-44F1-A3E1-2B4BB78E152D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.72:*:*:*:*:*:*:*", "matchCriteriaId": "F39BAADB-6BF1-4871-ABEC-4BFA1321FE59", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.74:*:*:*:*:*:*:*", "matchCriteriaId": "451A414E-1A02-45D1-8DFC-61B3E17BF12A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*", "matchCriteriaId": "B05B8522-E203-49A0-8C5B-3DA7B06AF5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*", "matchCriteriaId": "9FD064CE-3C39-4243-B59E-CC8E48ED50DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*", "matchCriteriaId": "9886B467-793C-4D07-9B1B-B80FA5266D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*", "matchCriteriaId": "676F5A96-B21B-49FF-86EA-F18F9C3931C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*", "matchCriteriaId": "18991132-C5B6-43AB-BDCB-196BB2957F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*", "matchCriteriaId": "42CE2596-83A9-4A80-A8C6-825EDEAAB8B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*", "matchCriteriaId": "CBA16BAF-6263-44EA-B3EB-187264913D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:5.0:*:microsoft_isa_2004:*:*:*:*:*", "matchCriteriaId": "8E7C32F4-1225-4A4E-BD98-DFE026383482", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security_5000_series:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "76147168-37FB-444C-BD40-EFC31A0A499A", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:mail_security_8820_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "823BD557-6352-4EC2-AE78-2C0CE6F660D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el componente Decomposer en m\u00faltiples producto Symantec que permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos .CAB manipulados." } ], "id": "CVE-2007-0447", "lastModified": "2024-11-21T00:25:53.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-05T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36118" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26053" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24282" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antivirus | 2.1 | |
symantec | norton_antivirus | 2005 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_system_works | 2004_professional | |
symantec | norton_system_works | 2005_premier |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "A9415109-C554-40F6-851E-CC016951BDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004_professional:*:*:*:*:*:*:*", "matchCriteriaId": "E6EEBC3A-58D9-4107-9561-106A9F3B0C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*", "matchCriteriaId": "B5E481D2-87F3-4912-BB87-5168C6A1BE23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share." } ], "id": "CVE-2005-0923", "lastModified": "2024-11-20T23:56:11.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/14741" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013585" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013586" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013587" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/713620" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/713620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12924" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-11 10:19
Modified
2024-11-21 00:13
Severity ?
Summary
The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to "crash the control" via unspecified vectors related to content on a web site, and place Internet Explorer into a "defunct state" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antivirus | 2005 | |
symantec | norton_antivirus | 2006 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to \"crash the control\" via unspecified vectors related to content on a web site, and place Internet Explorer into a \"defunct state\" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771." }, { "lang": "es", "value": "El control ActiveX Symantec NAVOPTS.DLL (tambi\u00e9n se conoce como Symantec.Norton.AntiVirus.NAVOptions) versi\u00f3n 12.2.0.13, tal y como es usado en Norton AntiVirus, Internet Security y System Works 2005 y 2006, est\u00e1 dise\u00f1ado para usarse \u00fanicamente en navegadores web integrados en aplicaciones, lo que permite atacantes remotos \"crash the control\" por medio de vectores no especificados relacionados con el contenido en un sitio web, y colocar Internet Explorer en un \"defunct state\" en el que los atacantes remotos pueden ejecutar c\u00f3digo arbitrario adem\u00e1s de otros controles ActiveX de Symantec, independientemente de si est\u00e1n marcados como seguros para el scripting. NOTA: este CVE fue utilizado inadvertidamente para un problema de protecci\u00f3n autom\u00e1tica de correo electr\u00f3nico, pero a ese problema ha sido asignado CVE-2007-3771." } ], "id": "CVE-2006-3456", "lastModified": "2024-11-21T00:13:39.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-05-11T10:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35075" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25172" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23822" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018031" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1751" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-04-08 17:05
Modified
2024-11-21 00:41
Severity ?
Summary
Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows | * | |
symantec | norton_360 | 1.0 | |
symantec | norton_antivirus | 2006 | |
symantec | norton_antivirus | 2007 | |
symantec | norton_antivirus | 2008 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_internet_security | 2007 | |
symantec | norton_internet_security | 2008 | |
symantec | norton_system_works | 2006 | |
symantec | norton_system_works | 2007 | |
symantec | norton_system_works | 2008 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_360:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "00819E08-CC5C-48FC-9F80-95B68AB19C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C988B309-F397-412A-8570-C3823C7FE7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FA990FD5-DF2F-470A-936D-155A36BEDE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "692ECBCD-AB6B-4965-93F4-BDAD4777C018", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2008:*:*:*:*:*:*:*", "matchCriteriaId": "3EF87752-C86D-4C89-9DE9-F874068C89EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2007:*:*:*:*:*:*:*", "matchCriteriaId": "92039406-19AB-43C6-97AE-3D7C13FD8AD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2008:*:*:*:*:*:*:*", "matchCriteriaId": "22CAEA36-93A4-48F5-B093-6DD843BB9FE9", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el AutoFix Support Tool ActiveX control 2.7.0.1 en SYMADATA.DLL de m\u00faltiples productos de Symantec Norton, incluyendo Norton 360 1.0, AntiVirus 2006 hasta 2008, Internet Security 2006 hasta 2008, y System Works 2006 hasta 2008; permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento largo al m\u00e9todo GetEventLogInfo. NOTA: Algunos de estos detalles se han obtenido de informaci\u00f3n de terceros." } ], "id": "CVE-2008-0312", "lastModified": "2024-11-21T00:41:38.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-04-08T17:05:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29660" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28507" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019751" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019752" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019753" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/28507" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1019753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41629" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-19 01:07
Modified
2024-11-21 00:19
Severity ?
Summary
Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | automated_support_assistant | * | |
symantec | norton_antivirus | * | |
symantec | norton_internet_security | 2006 | |
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:automated_support_assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B0CDB6-4DB2-4F75-B408-7E8EC39446FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A58C09D-72A0-48E1-ABF0-49EBECA5D02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en el Control de ActiveX usado en Symantec Automated Support Assistant, como el usado en el AntiVirus Norton, en Internet Security y System Works 2005 y 2006, permite a los atacantes remotos con la complicidad del usuario, causar la denegaci\u00f3n de servicio (ca\u00edda) y la posibilidad de ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores no definidos." } ], "id": "CVE-2006-5403", "lastModified": "2024-11-21T00:19:05.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-10-19T01:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22228" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016988" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016989" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016990" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016991" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/400601" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20348" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/400601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29363" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_antivirus | 2.1 | |
symantec | norton_antivirus | 2005 | |
symantec | norton_internet_security | 2004 | |
symantec | norton_internet_security | 2005 | |
symantec | norton_system_works | 2004_professional | |
symantec | norton_system_works | 2005_premier |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "A9415109-C554-40F6-851E-CC016951BDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004_professional:*:*:*:*:*:*:*", "matchCriteriaId": "E6EEBC3A-58D9-4107-9561-106A9F3B0C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*", "matchCriteriaId": "B5E481D2-87F3-4912-BB87-5168C6A1BE23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type." } ], "id": "CVE-2005-0922", "lastModified": "2024-11-20T23:56:11.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/14741" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013585" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013586" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1013587" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/146020" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12923" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/14741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1013587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/146020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12923" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-05 21:17
Modified
2024-11-21 00:33
Severity ?
Summary
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D2AD14C-2BD2-4658-BDB0-232A9E26EA2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.0:*:clearswift:*:*:*:*:*", "matchCriteriaId": "1E739083-DFC2-4A89-9F84-E067E127D420", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E65DC45B-8FA9-453E-8249-45535EA64D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "C9DA3717-A218-459B-891C-F3F945D42A22", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "F11687CE-E997-4D26-ACAE-B9175348ADDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:caching:*:*:*:*:*", "matchCriteriaId": "2F90AD67-02CB-4006-B567-631FD633DB17", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:clearswift:*:*:*:*:*", "matchCriteriaId": "BC0F87D0-E4B5-41FC-8050-386B9CE04249", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:microsoft_sharepoint:*:*:*:*:*", "matchCriteriaId": "FBBFF303-3DD6-4312-94CD-37E5170A93AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3:*:network_attached_storage:*:*:*:*:*", "matchCriteriaId": "59962A9A-10F4-4F1B-A5AB-8743C0874963", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "346F8C27-F389-412C-B7C2-2CF3344E557C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.7.27:*:*:*:*:*:*:*", "matchCriteriaId": "51170553-03E8-4588-97A0-8DA57C37B5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.8.29:*:*:*:*:*:*:*", "matchCriteriaId": "A32C5A4C-9E39-4718-8BF1-283183B4A516", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "301B1340-A402-4D3E-AAF8-17CD8B59517D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:caching:*:*:*:*:*", "matchCriteriaId": "52CE5595-323D-45A2-BD05-C6B2CBD6BA38", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:clearswift:*:*:*:*:*", "matchCriteriaId": "3042D5B7-AE27-4664-87DB-679422029199", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:messaging:*:*:*:*:*", "matchCriteriaId": "671CBE65-1FCF-43B8-8D21-5C8CC7C17417", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:microsoft_sharepoint:*:*:*:*:*", "matchCriteriaId": "28BD859A-F57B-444C-8083-AE99E59B9DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:4.3.12:*:network_attached_storage:*:*:*:*:*", "matchCriteriaId": "6158E16F-468A-4B76-8199-500FCAC1E54D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "992DB720-52A8-43D4-B74B-96C0F763ED0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus_scan_engine:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "685F58DC-6BD3-499C-A9D5-BB9C909FE857", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "95436CD6-8E9C-4F89-9683-0650F6167027", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC910CFD-9F20-473E-BC2D-64A7A3C14404", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "849782E0-9F26-411F-82B9-88B5FC4F4C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EAD87DB3-45C2-4091-A83B-25E427563C70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0910781-9EF9-4188-AA33-1C54F01A0832", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7647813B-2B9F-4B0F-96D1-C533A49DDC6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail_antispam:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "09AD23D0-4502-4090-9172-002B92D83C09", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:scf_7.1:*:*:*:*:*", "matchCriteriaId": "97AF14CF-3BD6-4A03-B543-3150C656198E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:build_9.0.0.338:stm:*:*:*:*:*", "matchCriteriaId": "8A1E2653-A061-48BD-AC62-643CDD78E859", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4D86F7A-F2C0-471C-8EA8-E1C7230F25AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.4:mr4_build1000:*:*:*:*:*:*", "matchCriteriaId": "11C1491F-01A1-47B1-87BB-6F7676448A2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100_mp1:mr5:*:*:*:*:*:*", "matchCriteriaId": "9204DC08-0809-4762-B5CB-5485E67CA31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.6:mr6:*:*:*:*:*:*", "matchCriteriaId": "841CF36F-14A0-49A6-8442-681F25DC8DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*", "matchCriteriaId": "DA6CFDFD-1EB4-458A-AD39-320E619593D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "05B85F14-4248-4550-BE7F-D9BAB9DC90C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build456:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "419D2E24-CA90-471D-9F35-1795F6A65B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build463:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "965DA3C4-7559-4583-A5DC-BEABEAA7E87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build465:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EBEB8E8E-DB27-45FB-90CA-2CF3A515AC4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build736:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "8184E073-37B0-4654-8DF8-379EFC5FB0D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build741:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "C29B7C1F-C4AB-4CAB-8177-B64F4B8A2B26", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0:build743:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "D1FBFE00-4692-48C2-A6C7-9179E185A275", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.0.1:*:domino:*:*:*:*:*", "matchCriteriaId": "DBE74BFA-003E-40CC-83E1-1AC7159B0C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build458:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "E21CDCBA-3C86-462B-8383-58C893978EBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build459:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "E6179A68-2322-4D79-9446-5A5E4B27AD33", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.1:build461:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "EE92421B-C0CA-4B28-9E26-EF0A115C9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "DC8AD646-E257-4065-B358-8B4944D327E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5.4.743:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "F50BA510-67D5-4FF1-87D0-215B68D20EA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*", "matchCriteriaId": "5CA62889-7A55-459F-BFD8-D38CD93F9219", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_736:*:exchange:*:*:*:*:*", "matchCriteriaId": "766327B9-E8DA-4422-80C2-48E333161D0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.5_build_741:*:exchange:*:*:*:*:*", "matchCriteriaId": "3C5FF883-831F-47CC-BD04-BBFD25BDE8DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6.1.107:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "C6EAA83D-2073-4360-BD3C-59AF34EADE1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6.3:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "60D239DF-65AD-4492-AEE1-FCD36E99DD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:4.6_build_97:*:exchange:*:*:*:*:*", "matchCriteriaId": "7AD92ABA-2D03-46FD-85D5-33FC369015DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:smtp:*:*:*:*:*", "matchCriteriaId": "96E660E2-C0F9-499F-A01D-DB368179F28F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.204:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "8E1C4824-3774-41EF-80E1-42A417830978", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.1.0:*:domino:*:*:*:*:*", "matchCriteriaId": "A3D2C4B6-2F13-4487-989E-AC247D4D011A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:6.0.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "091D4557-21F6-412F-933A-9F0FD8152E28", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:*:*:corporate_edition_for_linux:*:*:*:*:*", "matchCriteriaId": "2CC0DE59-149C-42DD-9516-BDB79A9BC412", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "88FE6753-A619-4703-8120-F23EEC8C48EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "497635AC-D7F2-4A5C-8C37-DA493C9681A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "E72D8D65-340C-4505-AA80-F9E7870513EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "774AD674-895A-4242-9AC9-BAD6CB862785", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "242D33E8-1B6B-4562-9F2A-1B34E3B7BC71", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "C9797D21-CD64-4B61-A4C1-AC4AD3F9B3D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:macintosh:*:*:*:*:*", "matchCriteriaId": "252ACD1B-323F-4139-880D-89D600F29986", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "618F6F78-566A-4901-8B57-BB6DCAC7E892", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3:*:macintosh:*:*:*:*:*", "matchCriteriaId": "B2D0922A-3EA3-4BC9-9311-9DCA57338CBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "EB7F329F-4390-4735-B2C2-BC6A72FBE36A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A5D058F6-779B-4ED4-ADC7-A68491F72BAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:mr4_build_1000:corporate_edition:*:*:*:*:*", "matchCriteriaId": "29E1AF72-6D48-4DAF-904A-B55366189251", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "4B5EE3B2-FF16-4231-B99D-81CB10239576", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "7D26AB91-36AB-4BF6-9D0D-098F04C60AAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.6.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "E5E0AB4E-4DD0-4D87-BBE5-B459A8B7301F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "4433613D-EB44-4D60-861F-F9FFA2ED4F6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "7225A578-8F62-42BD-99AC-D3385478613A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "FF0903BD-3E78-4024-A773-16100F519B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.0.359:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "BF18D806-E781-4F17-9341-D48CBC06949E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "1B390577-F1F1-4821-90FB-967E749F7CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "88AA69B4-865C-4959-9681-62A7591D6CFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1007:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "55EDC888-F593-49E8-95A4-87D8FE9CC09A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.1.1008:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B7A47F4F-DC34-4B7D-9C3A-4631FFFC1142", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B70ACBE6-C754-4A6F-AC2F-89657DA179E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "8C6C2421-5651-4B3F-9DBC-DC411C989BE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "5B967B9A-215D-470A-9722-5782D0AE0980", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "F4BFDD98-F70E-41A9-9245-7EC5D140D4F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "DFC9BF64-65E7-4E0E-A637-13794A02CEED", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "6B188333-A087-4FC7-864B-F802932455F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A33A8A08-F356-4616-A603-00ADCC062D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B5889206-CE1C-489B-8984-EE4055BBC6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "62EA1AE0-6A8B-4C13-B95D-7F9694AD5535", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4:mr4_mp1_build4010:corporate_edition:*:*:*:*:*", "matchCriteriaId": "B31249CA-296D-42C2-8939-61B990559BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.4.4010:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "5C6B6D3A-715A-45B9-8231-77A6DE847973", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.394:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "73A3CB7B-DD39-48E7-8D33-1E222933A7D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.396:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "116F0C9D-9255-4B98-B1CF-C78A96240784", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.400:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "A8957B43-0673-439F-86F6-5791372BA498", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1.401:*:corporate_edition:*:*:*:*:*", "matchCriteriaId": "D2ACD718-6232-463A-ACEE-B06A02D3243A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.9.1:*:macintosh:*:*:*:*:*", "matchCriteriaId": "44073E2A-A8AB-4D1A-BCFC-8439E40E97E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "3967227C-FCB1-486E-A6C4-43B8004C4A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "894F1929-1029-4B57-A66A-EA58F7D94D1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "C532E93A-5D0D-454D-8B14-F5E9C6A0499F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "D2259605-B720-42B0-8476-6CAE07C7B143", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "F39AE3D7-7018-47AB-B332-D40EA5273CEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "82446BA3-92F9-4689-9D67-3CE159AA0F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:11.5.6.14:*:*:*:*:*:*", "matchCriteriaId": "98F9F2E3-1775-4EF9-9FE0-0D011307C269", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*", "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:3.0:*:macintosh:*:*:*:*:*", "matchCriteriaId": "F648A08A-24EF-45A5-B7FD-00CAD5892061", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:premier:*:*:*:*:*", "matchCriteriaId": "CBB1521D-B16D-4E28-8723-AF96E95D7596", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0:*:*:*:*:*:*", "matchCriteriaId": "67EECA52-EECB-4AAA-85F9-ADBE028B8068", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:11.0.9:*:*:*:*:*:*", "matchCriteriaId": "CE8022C6-360B-4A3D-AD70-3DC79B339231", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:symantec_antivirus_filtering_\\+for_domino:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "37AE8BC0-663C-4D1D-8FF5-13F682BBEE79", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "60B08F85-A0E6-4984-83E9-41CD29751BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "690F3A5F-F990-41C9-9964-B033188C86F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "43E4FAC8-2893-48FA-B159-49C8AA380338", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "5D37768F-A43C-420E-85CA-A5EF3E30F47F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1.76:*:*:*:*:*:*:*", "matchCriteriaId": "ABE3F492-D08F-4558-BC19-F33BBB0D55A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.70:*:*:*:*:*:*:*", "matchCriteriaId": "B4CD5C31-4F4A-44F1-A3E1-2B4BB78E152D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.72:*:*:*:*:*:*:*", "matchCriteriaId": "F39BAADB-6BF1-4871-ABEC-4BFA1321FE59", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.0.1_build_3.01.74:*:*:*:*:*:*:*", "matchCriteriaId": "451A414E-1A02-45D1-8DFC-61B3E17BF12A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*", "matchCriteriaId": "B05B8522-E203-49A0-8C5B-3DA7B06AF5AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*", "matchCriteriaId": "9FD064CE-3C39-4243-B59E-CC8E48ED50DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*", "matchCriteriaId": "9886B467-793C-4D07-9B1B-B80FA5266D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*", "matchCriteriaId": "676F5A96-B21B-49FF-86EA-F18F9C3931C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*", "matchCriteriaId": "18991132-C5B6-43AB-BDCB-196BB2957F27", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*", "matchCriteriaId": "42CE2596-83A9-4A80-A8C6-825EDEAAB8B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*", "matchCriteriaId": "CBA16BAF-6263-44EA-B3EB-187264913D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:web_security:5.0:*:microsoft_isa_2004:*:*:*:*:*", "matchCriteriaId": "8E7C32F4-1225-4A4E-BD98-DFE026383482", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:symantec:gateway_security_5000_series:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "76147168-37FB-444C-BD40-EFC31A0A499A", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:gateway_security_5400:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DA896DF0-76AD-4CEE-9FE0-5E6758FC9A68", "vulnerable": true }, { "criteria": "cpe:2.3:h:symantec:mail_security_8820_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "823BD557-6352-4EC2-AE78-2C0CE6F660D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header." }, { "lang": "es", "value": "El componente Decomposer en m\u00faltiples productos Symantec permite a atacantes remotos provocar denegaci\u00f3n de servicio (bucles infinitos) a trav\u00e9s de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR." } ], "id": "CVE-2007-3699", "lastModified": "2024-11-21T00:33:51.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-10-05T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/36119" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26053" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24282" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26053" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-02 22:19
Modified
2024-11-21 00:29
Severity ?
Summary
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "EEB639EF-B434-42ED-A162-A2593FA78E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "5BA427D2-2F74-4314-B68A-164E2B6B0240", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.1.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "549049F7-2698-4F68-A1D0-1E4546B9EB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "3E86D9CE-8A86-498B-B3A3-8988274A91E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "BBF13A92-83EF-44EE-AD87-BA0CF8FF266D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.2.2:*:corporate:*:*:*:*:*", "matchCriteriaId": "D92B456D-A69E-4B10-8F74-D3DFC242F641", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.3:*:corporate:*:*:*:*:*", "matchCriteriaId": "643AF180-138C-472A-8BC5-B8B028E77CDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "0D56068D-CEF2-46B7-9914-36AB961839C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "C8ADDF27-67FF-41D7-BF2E-87AE06FDECD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.6:*:corporate:*:*:*:*:*", "matchCriteriaId": "002290DD-589E-404F-BFC0-A1239D0E92E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.7:*:corporate:*:*:*:*:*", "matchCriteriaId": "D2854BCF-2D37-4BE9-A590-7E25DF443EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.8:*:corporate:*:*:*:*:*", "matchCriteriaId": "4BDB19A7-8DFA-43AD-9C44-16BBCF4531B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:antivirus:10.0.9:*:corporate:*:*:*:*:*", "matchCriteriaId": "ED683B68-530A-436F-A49B-32890EDFAC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.0.359:*:*:*:*:*:*:*", "matchCriteriaId": "FDB1C90D-DBC0-4DA0-AF5D-E42C41E84B60", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*", "matchCriteriaId": "2852548A-39A6-44FB-A73E-96507BA0CD8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*", "matchCriteriaId": "FB9641FC-FF7B-4413-8163-B795AA35C888", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*", "matchCriteriaId": "17862D7F-7001-46B8-A415-2A15A247E9BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*", "matchCriteriaId": "170AEE7B-31AF-44E2-9B63-9703D0DE721C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*", "matchCriteriaId": "E651C9BE-201B-4DDC-A650-F9269531290C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "56EA0BAC-ED6D-45D2-995C-18B828906E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*", "matchCriteriaId": "63B1A9FC-707C-4F6F-959B-30B28E43D202", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*", "matchCriteriaId": "87E4E013-A819-42E0-8F8E-9B2D409F900E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*", "matchCriteriaId": "097B87A8-8176-4426-BDE4-6FDDD272E1B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*", "matchCriteriaId": "5EBD7767-C352-435B-8963-83F723FFD302", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*", "matchCriteriaId": "E2FC1708-B643-4489-A59C-EBDAFD9B0078", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*", "matchCriteriaId": "7DCE0C8A-A97C-4DE1-B0EE-3A2D16A34C77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*", "matchCriteriaId": "EE714705-CEE9-4BA1-8573-FD3765BC7F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*", "matchCriteriaId": "17110872-8BD5-4CB0-9F2A-B18D091A7EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*", "matchCriteriaId": "9D29AD07-6545-4180-8E32-C18586684845", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.394:*:*:*:*:*:*:*", "matchCriteriaId": "D6090F86-0B42-403F-9996-9B7670EBAA5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*", "matchCriteriaId": "B3706E76-FC65-467E-8D09-A9EAC32E9BBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*", "matchCriteriaId": "BF555313-BB5A-4D8A-A3A1-609ABC39F6FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*", "matchCriteriaId": "BC74372F-329A-4597-810B-88B865771C9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_360:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "00819E08-CC5C-48FC-9F80-95B68AB19C65", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "matchCriteriaId": "EA28BC22-ABF0-4F1E-BA83-85B398775450", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antispam:2005:*:*:*:*:*:*:*", "matchCriteriaId": "44553774-85FF-4F2E-81CA-696A454EAA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:*:*:*:*:*:*", "matchCriteriaId": "DF5E129A-4FA8-4084-92BE-5A65FABD53DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C988B309-F397-412A-8570-C3823C7FE7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2008:*:*:*:*:*:*:*", "matchCriteriaId": "FA990FD5-DF2F-470A-936D-155A36BEDE3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "692ECBCD-AB6B-4965-93F4-BDAD4777C018", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2008:*:*:*:*:*:*:*", "matchCriteriaId": "3EF87752-C86D-4C89-9DE9-F874068C89EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "0E8C73F1-FEF1-40A3-BFAB-CE226B98E001", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006_9.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "3FC50007-59F4-45B0-BABF-BCF2CAB4A9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." }, { "lang": "es", "value": "El archivo SPBBCDrv.sys en Symantec Norton Personal Firewall 2006 versiones 9.1.0.33 y 9.1.1.7 no comprueba ciertos argumentos antes de ser pasado hacia los controladores de la funci\u00f3n SSDT enlazada, lo que permite a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo) o posiblemente ejecutar c\u00f3digo arbitrario por medio de argumentos creados para las funciones (1) NtCreateMutant y (2) NtOpenEvent. NOTA: m\u00e1s tarde se inform\u00f3 que Norton Internet Security 2008 versi\u00f3n 15.0.0.60, y posiblemente otras versiones de 2006, tambi\u00e9n se ven afectados." } ], "id": "CVE-2007-1793", "lastModified": "2024-11-21T00:29:10.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-02T22:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/34692" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24677" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "source": "cve@mitre.org", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23241" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017837" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017838" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021386" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021387" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021388" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021389" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/23241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securitytracker.com/id?1017838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021386" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-09-19 18:07
Modified
2024-11-21 00:16
Severity ?
Summary
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1DFD4CB-40A1-4D70-97AC-0941826F28CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.0_b8.01.9378:*:*:*:*:*:*:*", "matchCriteriaId": "9A56518F-41E9-455D-9AC1-98FFDCE295C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5C856CC4-0AAE-4539-A57B-0160AA5751F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.425a:mr1:*:*:*:*:*:*", "matchCriteriaId": "9EE482AD-A0F8-4634-A3FE-08F112647648", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.429c:mr2:*:*:*:*:*:*", "matchCriteriaId": "B3FC66EB-2267-4B42-BD99-C4344DAE1C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*", "matchCriteriaId": "BE15AE1D-8647-444F-90F0-FC658A3AC344", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*", "matchCriteriaId": "0C03FA86-F2E6-4E41-8368-E917C91D7837", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*", "matchCriteriaId": "95BF74F0-40F1-4395-AC85-E6B566950C53", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*", "matchCriteriaId": "994CB184-AFE8-4673-ACE8-085813F1E71F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*", "matchCriteriaId": "85CF6FFB-4189-4558-A70D-DE6D4C0C1F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*", "matchCriteriaId": "31D6A148-A92C-4FCA-8762-16764D62C363", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*", "matchCriteriaId": "3E6E2EA2-88DA-4DF0-9AA3-3E3D2C80C04E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.501:mr9:*:*:*:*:*:*", "matchCriteriaId": "AC1B69D3-8A9C-481E-8891-1ACD8479CBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.0_build_8.01.9374:*:*:*:*:*:*:*", "matchCriteriaId": "70D72649-92F9-4820-B5A5-A14B52714809", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7483F6DD-EDC0-497E-A5A9-B186E02CCCEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DA2590E-DFB0-4B72-99BC-B49AD97A4969", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_build_393:*:*:*:*:*:*:*", "matchCriteriaId": "766C850E-817E-41AB-B0FF-413513548BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*", "matchCriteriaId": "FB47C16B-5221-4D64-BDB2-65D072A66C02", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*", "matchCriteriaId": "204F2046-F116-45D7-9256-179A3B59886A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*", "matchCriteriaId": "CD0C67C0-3CF1-4BAD-A673-9B783E1D0724", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*", "matchCriteriaId": "274EA5DA-9519-46DE-B11E-87BDF1978E14", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*", "matchCriteriaId": "044C020A-0BCC-4037-BC32-73385A0BE019", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1.1_mr6_b8.1.1.266:*:*:*:*:*:*:*", "matchCriteriaId": "9A0176BE-3D55-422B-9FDD-961A00CFAC19", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:1.1_stm_b8.1.0.825a:*:*:*:*:*:*:*", "matchCriteriaId": "CA3D7305-B8D0-4165-9F0F-50A49142EF2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DDD0E02-306D-4675-B73A-2C2F619CDDCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.1_build_9.0.1.1000:mr1:*:*:*:*:*:*", "matchCriteriaId": "D934F853-C7E0-421E-9AF3-B7B49228722F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.2_build_9.0.2.1000:mr2:*:*:*:*:*:*", "matchCriteriaId": "D608AACF-A4BC-49CE-BE49-E8F3AEF31DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.3_build_9.0.3.1000:mr3:*:*:*:*:*:*", "matchCriteriaId": "3238894A-3C25-4CC8-A319-8AA7246FEC51", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0.5_build_1100:*:*:*:*:*:*:*", "matchCriteriaId": "69E9F1EE-CB23-42DE-8787-7F477D16329F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_scf_7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A7C2D813-C219-4FF3-9C3B-DBB855480492", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:2.0_stm_build_9.0.0.338:*:*:*:*:*:*:*", "matchCriteriaId": "A5A00A25-A52F-4E9D-AAD0-194171C772FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "844A6963-F60C-4D48-8445-9056C99201D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D24019B-20F0-4B4D-86A5-9409698E6216", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:host_ids:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F05B889-88D3-41AF-A79D-3E2F689BA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2.1:*:ms_exchange:*:*:*:*:*", "matchCriteriaId": "A9415109-C554-40F6-851E-CC016951BDF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "595CDCD1-4E0B-49E4-B726-82FAA99EF70A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "DBBAD310-3E2E-4E83-A605-47540668827F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.425a:*:corporate:*:*:*:*:*", "matchCriteriaId": "F4341136-7821-4638-9F36-93361327250E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.425c:*:corporate:*:*:*:*:*", "matchCriteriaId": "497BC653-98D7-41C5-94BB-2634B9C5BF55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.501:*:corporate:*:*:*:*:*", "matchCriteriaId": "094EED2C-F8FA-418B-B110-E44D90B9BA33", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.9374:*:corporate:*:*:*:*:*", "matchCriteriaId": "15AEADC9-00B9-43BA-AABB-ADB7627CF0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.0.1.9378:*:corporate:*:*:*:*:*", "matchCriteriaId": "39D769B1-B1D6-4F5C-9C66-00055D4A6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "3AA02AEB-362B-4A09-92E3-D6D8BB4B6CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.0.825a:*:corporate:*:*:*:*:*", "matchCriteriaId": "3A82AC27-8BE6-47F7-A6EC-F4C21373AA58", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "ECAA6170-5520-4AA9-8358-5F91FD10420E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*", "matchCriteriaId": "E626F14C-FDE9-4C6A-8CE7-B99CD4FEE485", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*", "matchCriteriaId": "EC4CFE5A-4D51-405D-B92E-37DE4E617ABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*", "matchCriteriaId": "727A116A-D18C-4F3F-A6A8-2C6107FFB8C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.366:*:corporate:*:*:*:*:*", "matchCriteriaId": "EAE76215-2A7E-4D71-8757-AE10E4A9AE0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1.377:*:corporate:*:*:*:*:*", "matchCriteriaId": "AF45DF9D-D7BE-41AD-A838-0AF9A264EBFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*", "matchCriteriaId": "4A6612F1-4CA8-427A-AED4-854F943BA3D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.1.1_build393:*:corporate:*:*:*:*:*", "matchCriteriaId": "902A4011-83C5-4A3B-B443-C51EA855E8E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.434:*:corporate:*:*:*:*:*", "matchCriteriaId": "8BB225A0-7FB9-4AD2-8ED2-5CC1AEBAAB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.437:*:corporate:*:*:*:*:*", "matchCriteriaId": "9603C423-F24A-4607-B721-D02EDA94AE8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.446:*:corporate:*:*:*:*:*", "matchCriteriaId": "574AAAA6-8181-457B-84CE-5AEB1895E3B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.457:*:corporate:*:*:*:*:*", "matchCriteriaId": "DF957AD3-B6E5-4BD7-832F-33E734817B77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.460:*:corporate:*:*:*:*:*", "matchCriteriaId": "14D862F4-BE5F-4E6B-9955-ACFB48A5D3B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.464:*:corporate:*:*:*:*:*", "matchCriteriaId": "768B7F5E-E4AD-420E-92FA-A58E1AE3D1BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:8.01.471:*:corporate:*:*:*:*:*", "matchCriteriaId": "C15B7FEA-E6A9-4DBE-B1A9-E17E91512A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "D9E85FD6-9E89-4497-854C-60A20639CE52", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.0.338:*:corporate:*:*:*:*:*", "matchCriteriaId": "91F70069-D0F2-41D8-862F-2162CE12D49F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "EDF0DA40-1AC4-4610-AEAC-F431E23BAEAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.2.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "5696AC09-E8BB-4060-9A81-EA2B190B850A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.3.1000:*:corporate:*:*:*:*:*", "matchCriteriaId": "C18E6605-5F86-4957-AE16-80F59F40110E", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*", "matchCriteriaId": "56D54011-9B09-4C63-8301-609C03E51099", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5:*:corporate:*:*:*:*:*", "matchCriteriaId": "9EF7F7F6-FC6B-4258-AE1D-3E4C19B365B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:9.0.5.1100:*:corporate:*:*:*:*:*", "matchCriteriaId": "A10DA055-1F24-4AFD-A688-58D1DB4FB64A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0:*:corporate:*:*:*:*:*", "matchCriteriaId": "CAC5389A-8B18-40C4-A3E0-E50B6AA724FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2000:*:corporate:*:*:*:*:*", "matchCriteriaId": "88090CD5-A324-4A41-A55E-9381FBC14B62", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2001:*:corporate:*:*:*:*:*", "matchCriteriaId": "78E79E4D-E93B-4C6C-92EE-1E33EE1AEB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2002:*:corporate:*:*:*:*:*", "matchCriteriaId": "F6E6EC72-9B83-4685-B48E-25E4211EC280", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2010:*:corporate:*:*:*:*:*", "matchCriteriaId": "275187A5-FB3A-41C2-A6F4-F2DC9D88D0DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2011:*:corporate:*:*:*:*:*", "matchCriteriaId": "A7F0C0E9-9665-452E-A382-04656F2009AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2020:*:corporate:*:*:*:*:*", "matchCriteriaId": "6A220194-CCB1-41F6-9CB0-A79C2E5E36FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.0.2.2021:*:corporate:*:*:*:*:*", "matchCriteriaId": "4D3CBEF5-25C6-41E8-97A3-2AA43134E619", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:10.1:*:corporate:*:*:*:*:*", "matchCriteriaId": "81AE594C-41ED-4FE8-839D-B604AE8DC901", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34B1D862-2CB4-4D50-9BBA-0507FEAA1924", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2003:*:professional:*:*:*:*:*", "matchCriteriaId": "7D43A376-4282-4A66-860D-50483438EC80", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "C2E302A4-72F8-478B-9FA2-2536902986B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*", "matchCriteriaId": "11477B6E-C4C5-4664-91A7-D253077981F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*", "matchCriteriaId": "C988B309-F397-412A-8570-C3823C7FE7E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "matchCriteriaId": "AEF97C5F-3A80-4973-85FD-5BCE43B32AD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2003:*:professional:*:*:*:*:*", "matchCriteriaId": "EF583EBF-0FDC-45FD-ADAE-C38D9DB34ED2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "matchCriteriaId": "2ACBDE0C-91D2-4357-9724-B60BBFF5D2B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*", "matchCriteriaId": "09CA1AC8-E273-44C1-9D1C-19542EB57433", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*", "matchCriteriaId": "06C7CD61-A47B-4521-8C6F-4BB1F4C95614", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2005:*:professional:*:*:*:*:*", "matchCriteriaId": "E4BBE123-56E1-46E0-93BE-38F0932D9C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:professional:*:*:*:*:*", "matchCriteriaId": "1DE91FB9-35C3-4DC7-BE00-7C60EE9FD880", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*", "matchCriteriaId": "692ECBCD-AB6B-4965-93F4-BDAD4777C018", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*", "matchCriteriaId": "74E5CAF7-C305-4FAF-8DA7-627D83F65185", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "matchCriteriaId": "36C0FF0C-EB6E-479B-BFF9-E55CBC0D6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2005:*:*:*:*:*:*:*", "matchCriteriaId": "CB5F3CB3-7EB3-416C-AD2F-6357DC7248CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_personal_firewall:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C890A979-00E7-44E6-8CEA-8E4B2C966622", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2003_professional_edition:*:*:*:*:*:*:*", "matchCriteriaId": "79F3EAD1-C4DA-48E8-A582-A14F4401AD15", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004:*:*:*:*:*:*:*", "matchCriteriaId": "F589D9AA-FD1B-4929-93DC-801C36087E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2004_professional_edition:*:*:*:*:*:*:*", "matchCriteriaId": "C37BF3DA-FD23-49A1-B97D-FD3B5896574D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*", "matchCriteriaId": "B5E481D2-87F3-4912-BB87-5168C6A1BE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:pcanywhere:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "A496D973-4BC8-4377-8C84-8F2CB281AEE1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." }, { "lang": "es", "value": "El driver \\Device\\SymEvent en Symantec Norton Personal Firewall 2006 9.1.0.33, y otras versiones del Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, y 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0 y 10.1, Symantec pcAnywhere 11.5 y Symantec Host, permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) v\u00eda una informaci\u00f3n inv\u00e1lida, como ha sido demostrado llamando a DeviceIoControl para enviar la informaci\u00f3n." } ], "id": "CVE-2006-4855", "lastModified": "2024-11-21T00:16:54.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-09-19T18:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21938" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1591" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016889" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016892" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016893" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016894" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016895" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016896" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016897" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016898" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20051" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016896" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/20051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-22 21:28
Modified
2024-11-21 00:22
Severity ?
Summary
Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
supportsoft | scriptrunner | * | |
supportsoft | smartissue | * | |
symantec | automated_support_assistant | * | |
symantec | norton_antivirus | 2006 | |
symantec | norton_internet_security | 2006 | |
symantec | norton_system_works | 2006 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:supportsoft:scriptrunner:*:*:*:*:*:*:*:*", "matchCriteriaId": "98D33388-F9B0-4901-AB69-D68BB3856336", "vulnerable": true }, { "criteria": "cpe:2.3:a:supportsoft:smartissue:*:*:*:*:*:*:*:*", "matchCriteriaId": "81D23C4B-6BD4-4355-8F5E-793EBFB6C19A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:automated_support_assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8B0CDB6-4DB2-4F75-B408-7E8EC39446FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*", "matchCriteriaId": "44843812-35FC-4378-B239-EEC74A0C8A39", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*", "matchCriteriaId": "C1CC64B1-772C-42A9-9B0A-08CA92DC87E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message." }, { "lang": "es", "value": "M\u00faltiples desbordamiento de b\u00fafer en los controles ActiveX de SupportSoft (1) SmartIssue (tgctlsi.dll) y (2) ScriptRunner (tgctlsr.dll), tal y como se usan en Symantec Automated Support Assistant y Norton AntiVirus, Internet Security, y System Works 2006, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un mensaje HTML manipulado." } ], "id": "CVE-2006-6490", "lastModified": "2024-11-21T00:22:48.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-22T21:28:00.000", "references": [ { "source": "cret@cert.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2007-02/0454.html" }, { "source": "cret@cert.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478" }, { "source": "cret@cert.org", "url": "http://osvdb.org/33481" }, { "source": "cret@cert.org", "url": "http://osvdb.org/33482" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/24246" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/24251" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/441785" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/461147/100/0/threaded" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/22564" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1017688" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1017689" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1017690" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1017691" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2007/0703" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2007/0704" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2007-02/0454.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/441785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/461147/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32636" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-11 21:03
Modified
2024-11-21 00:05
Severity ?
Summary
Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
symantec | norton_system_works | 2005 | |
symantec | norton_system_works | 2005_premier | |
symantec | norton_system_works | 2006 | |
symantec | norton_system_works | 2006_premier |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*", "matchCriteriaId": "29F670F0-FD5D-447C-94B8-691482D907F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2005_premier:*:*:*:*:*:*:*", "matchCriteriaId": "B5E481D2-87F3-4912-BB87-5168C6A1BE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*", "matchCriteriaId": "05EB078C-2538-4961-ABFF-6C4601C3977F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:norton_system_works:2006_premier:*:*:*:*:*:*:*", "matchCriteriaId": "07ED984C-BDE4-4CF6-ACBE-2D2FC01B5BDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products." } ], "id": "CVE-2006-0166", "lastModified": "2024-11-21T00:05:49.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-11T21:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18402" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015462" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0143" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24061" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-0249
Vulnerability from cvelistv5
Published
2005-02-08 05:00
Modified
2024-08-07 21:05
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/107822 | third-party-advisory, x_refsource_CERT-VN | |
http://xforce.iss.net/xforce/alerts/id/187 | third-party-advisory, x_refsource_ISS | |
http://securitytracker.com/id?1013133 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 | vdb-entry, x_refsource_XF | |
http://www.symantec.com/avcenter/security/Content/2005.02.08.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:05:25.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#107822", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/107822" }, { "name": "20050208 Symantec AntiVirus Library Heap Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://xforce.iss.net/xforce/alerts/id/187" }, { "name": "1013133", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013133" }, { "name": "upx-engine-gain-control(18869)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18869" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#107822", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/107822" }, { "name": "20050208 Symantec AntiVirus Library Heap Overflow", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://xforce.iss.net/xforce/alerts/id/187" }, { "name": "1013133", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013133" }, { "name": "upx-engine-gain-control(18869)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18869" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#107822", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/107822" }, { "name": "20050208 Symantec AntiVirus Library Heap Overflow", "refsource": "ISS", "url": "http://xforce.iss.net/xforce/alerts/id/187" }, { "name": "1013133", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013133" }, { "name": "upx-engine-gain-control(18869)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18869" }, { "name": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2005.02.08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0249", "datePublished": "2005-02-08T05:00:00", "dateReserved": "2005-02-08T00:00:00", "dateUpdated": "2024-08-07T21:05:25.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4855
Vulnerability from cvelistv5
Published
2006-09-19 18:00
Modified
2024-08-07 19:23
Severity ?
EPSS score ?
Summary
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:23:41.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016892", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016896" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20051" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016892", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016896" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20051" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016892", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016892" }, { "name": "21938", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21938" }, { "name": "1016893", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016893" }, { "name": "1016895", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016895" }, { "name": "1016889", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016889" }, { "name": "20060915 Symantec Norton Insufficient validation of \u0027SymEvent\u0027 driver input buffer", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/446111/100/0/threaded" }, { "name": "1016897", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016897" }, { "name": "1591", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1591" }, { "name": "1016896", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016896" }, { "name": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php" }, { "name": "20051", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20051" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html" }, { "name": "ADV-2006-3636", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3636" }, { "name": "symantec-firewall-symevent-dos(28960)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960" }, { "name": "1016894", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016894" }, { "name": "1016898", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016898" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4855", "datePublished": "2006-09-19T18:00:00", "dateReserved": "2006-09-19T00:00:00", "dateUpdated": "2024-08-07T19:23:41.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0922
Vulnerability from cvelistv5
Published
2005-03-29 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/12923 | vdb-entry, x_refsource_BID | |
http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1013586 | vdb-entry, x_refsource_SECTRACK | |
http://www.kb.cert.org/vuls/id/146020 | third-party-advisory, x_refsource_CERT-VN | |
http://securitytracker.com/id?1013587 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1013585 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/14741 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:29.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12923", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12923" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#146020", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/146020" }, { "name": "1013587", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013587" }, { "name": "1013585", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14741" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-04-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12923", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12923" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#146020", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/146020" }, { "name": "1013587", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013587" }, { "name": "1013585", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14741" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0922", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12923", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12923" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#146020", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/146020" }, { "name": "1013587", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013587" }, { "name": "1013585", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14741" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0922", "datePublished": "2005-03-29T05:00:00", "dateReserved": "2005-03-29T00:00:00", "dateUpdated": "2024-08-07T21:28:29.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1836
Vulnerability from cvelistv5
Published
2006-04-19 16:00
Modified
2024-08-07 17:27
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program.
References
▼ | URL | Tags |
---|---|---|
http://securityreason.com/securityalert/100 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/17571 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2006/1386 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/431318/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1015953 | vdb-entry, x_refsource_SECTRACK | |
http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/19682 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25839 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:27:29.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/100" }, { "name": "17571", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17571" }, { "name": "ADV-2006-1386", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "name": "20060418 [Symantec Security Advisory] LiveUpdate for Macintosh Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "name": "1015953", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015953" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html" }, { "name": "19682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19682" }, { "name": "liveupdate-exepath-env-privilege-escalation(25839)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "100", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/100" }, { "name": "17571", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17571" }, { "name": "ADV-2006-1386", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "name": "20060418 [Symantec Security Advisory] LiveUpdate for Macintosh Local Privilege Escalation", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "name": "1015953", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015953" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html" }, { "name": "19682", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19682" }, { "name": "liveupdate-exepath-env-privilege-escalation(25839)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in unspecified components in Symantec LiveUpdate for Macintosh 3.0.0 through 3.5.0 do not set the execution path, which allows local users to gain privileges via a Trojan horse program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "100", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/100" }, { "name": "17571", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17571" }, { "name": "ADV-2006-1386", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1386" }, { "name": "20060418 [Symantec Security Advisory] LiveUpdate for Macintosh Local Privilege Escalation", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/431318/100/0/threaded" }, { "name": "1015953", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015953" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.04.17b.html" }, { "name": "19682", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19682" }, { "name": "liveupdate-exepath-env-privilege-escalation(25839)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25839" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1836", "datePublished": "2006-04-19T16:00:00", "dateReserved": "2006-04-19T00:00:00", "dateUpdated": "2024-08-07T17:27:29.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-6490
Vulnerability from cvelistv5
Published
2007-02-22 21:00
Modified
2024-08-07 20:26
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:26:46.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070223 Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2007-02/0454.html" }, { "name": "VU#441785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/441785" }, { "name": "ADV-2007-0704", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0704" }, { "name": "20070223 Re: Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/461147/100/0/threaded" }, { "name": "1017688", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017688" }, { "name": "ADV-2007-0703", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0703" }, { "name": "1017691", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017691" }, { "name": "33482", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33482" }, { "name": "24251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24251" }, { "name": "22564", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22564" }, { "name": "1017689", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017689" }, { "name": "1017690", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017690" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html" }, { "name": "supportsoft-activex-multiple-bo(32636)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32636" }, { "name": "33481", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33481" }, { "name": "24246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24246" }, { "name": "20070222 Multiple Vendor SupportSoft SmartIssue ActiveX Control Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "20070223 Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2007-02/0454.html" }, { "name": "VU#441785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/441785" }, { "name": "ADV-2007-0704", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0704" }, { "name": "20070223 Re: Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/461147/100/0/threaded" }, { "name": "1017688", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017688" }, { "name": "ADV-2007-0703", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0703" }, { "name": "1017691", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017691" }, { "name": "33482", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33482" }, { "name": "24251", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24251" }, { "name": "22564", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22564" }, { "name": "1017689", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017689" }, { "name": "1017690", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017690" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html" }, { "name": "supportsoft-activex-multiple-bo(32636)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32636" }, { "name": "33481", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33481" }, { "name": "24246", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24246" }, { "name": "20070222 Multiple Vendor SupportSoft SmartIssue ActiveX Control Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2006-6490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070223 Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2007-02/0454.html" }, { "name": "VU#441785", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/441785" }, { "name": "ADV-2007-0704", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0704" }, { "name": "20070223 Re: Stack Overflow in Third-Party ActiveX Controls affects Multiple Vendor Products Including Some Symantec Consumer Products and Automated Support", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/461147/100/0/threaded" }, { "name": "1017688", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017688" }, { "name": "ADV-2007-0703", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0703" }, { "name": "1017691", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017691" }, { "name": "33482", "refsource": "OSVDB", "url": "http://osvdb.org/33482" }, { "name": "24251", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24251" }, { "name": "22564", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22564" }, { "name": "1017689", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017689" }, { "name": "1017690", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017690" }, { "name": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2007.02.22.html" }, { "name": "supportsoft-activex-multiple-bo(32636)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32636" }, { "name": "33481", "refsource": "OSVDB", "url": "http://osvdb.org/33481" }, { "name": "24246", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24246" }, { "name": "20070222 Multiple Vendor SupportSoft SmartIssue ActiveX Control Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=478" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2006-6490", "datePublished": "2007-02-22T21:00:00", "dateReserved": "2006-12-12T00:00:00", "dateUpdated": "2024-08-07T20:26:46.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3699
Vulnerability from cvelistv5
Published
2007-10-05 21:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26053 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2508 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/36119 | vdb-entry, x_refsource_OSVDB | |
http://www.zerodayinitiative.com/advisories/ZDI-07-039.html | x_refsource_MISC | |
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/24282 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:52.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26053", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36119", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36119" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24282" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26053", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36119", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36119" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24282" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3699", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26053", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36119", "refsource": "OSVDB", "url": "http://osvdb.org/36119" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-039.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24282" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3699", "datePublished": "2007-10-05T21:00:00", "dateReserved": "2007-07-11T00:00:00", "dateUpdated": "2024-08-07T14:28:52.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0447
Vulnerability from cvelistv5
Published
2007-10-05 21:00
Modified
2024-08-07 12:19
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26053 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/2508 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/36118 | vdb-entry, x_refsource_OSVDB | |
http://www.zerodayinitiative.com/advisories/ZDI-07-040.html | x_refsource_MISC | |
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/24282 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:19:30.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26053", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36118", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36118" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24282" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26053", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36118", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36118" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24282" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26053", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26053" }, { "name": "ADV-2007-2508", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2508" }, { "name": "36118", "refsource": "OSVDB", "url": "http://osvdb.org/36118" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-040.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html" }, { "name": "24282", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24282" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0447", "datePublished": "2007-10-05T21:00:00", "dateReserved": "2007-01-23T00:00:00", "dateUpdated": "2024-08-07T12:19:30.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1346
Vulnerability from cvelistv5
Published
2005-04-28 04:00
Modified
2024-08-07 21:44
Severity ?
EPSS score ?
Summary
Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file.
References
▼ | URL | Tags |
---|---|---|
http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:06.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:41:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1346", "datePublished": "2005-04-28T04:00:00", "dateReserved": "2005-04-28T00:00:00", "dateUpdated": "2024-08-07T21:44:06.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5403
Vulnerability from cvelistv5
Published
2006-10-19 01:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1016988 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1016991 | vdb-entry, x_refsource_SECTRACK | |
http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1016989 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/3929 | vdb-entry, x_refsource_VUPEN | |
http://www.kb.cert.org/vuls/id/400601 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29363 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/22228 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1016990 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/20348 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:30.152Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016988", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "VU#400601", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/400601" }, { "name": "symantec-support-tool-activex-bo(29363)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29363" }, { "name": "22228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016990" }, { "name": "20348", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20348" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016988", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "VU#400601", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/400601" }, { "name": "symantec-support-tool-activex-bo(29363)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29363" }, { "name": "22228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016990" }, { "name": "20348", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20348" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5403", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016988", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016991" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "VU#400601", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/400601" }, { "name": "symantec-support-tool-activex-bo(29363)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29363" }, { "name": "22228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016990" }, { "name": "20348", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20348" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5403", "datePublished": "2006-10-19T01:00:00", "dateReserved": "2006-10-18T00:00:00", "dateUpdated": "2024-08-07T19:48:30.152Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0923
Vulnerability from cvelistv5
Published
2005-03-29 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share.
References
▼ | URL | Tags |
---|---|---|
http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1013586 | vdb-entry, x_refsource_SECTRACK | |
http://www.kb.cert.org/vuls/id/713620 | third-party-advisory, x_refsource_CERT-VN | |
http://securitytracker.com/id?1013587 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/12924 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1013585 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/14741 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:29.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#713620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/713620" }, { "name": "1013587", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013587" }, { "name": "12924", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12924" }, { "name": "1013585", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14741" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-04-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#713620", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/713620" }, { "name": "1013587", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013587" }, { "name": "12924", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12924" }, { "name": "1013585", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14741" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html" }, { "name": "1013586", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013586" }, { "name": "VU#713620", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/713620" }, { "name": "1013587", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013587" }, { "name": "12924", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12924" }, { "name": "1013585", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013585" }, { "name": "14741", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14741" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0923", "datePublished": "2005-03-29T05:00:00", "dateReserved": "2005-03-29T00:00:00", "dateUpdated": "2024-08-07T21:28:29.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2955
Vulnerability from cvelistv5
Published
2007-08-09 21:00
Modified
2024-08-07 13:57
Severity ?
EPSS score ?
Summary
Multiple unspecified "input validation error" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/35944 | vdb-entry, x_refsource_XF | |
http://www.symantec.com/avcenter/security/Content/2007.08.09.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1018547 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/secunia_research/2007-53/advisory/ | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2007/2822 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/25215 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id?1018546 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/24983 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1018545 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:57:54.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "symantec-navcomui-code-execution(35944)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35944" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html" }, { "name": "1018547", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018547" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2007-53/advisory/" }, { "name": "ADV-2007-2822", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2822" }, { "name": "25215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25215" }, { "name": "1018546", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018546" }, { "name": "24983", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24983" }, { "name": "1018545", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018545" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified \"input validation error\" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "symantec-navcomui-code-execution(35944)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35944" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html" }, { "name": "1018547", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018547" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2007-53/advisory/" }, { "name": "ADV-2007-2822", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2822" }, { "name": "25215", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25215" }, { "name": "1018546", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018546" }, { "name": "24983", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24983" }, { "name": "1018545", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018545" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2007-2955", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified \"input validation error\" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "symantec-navcomui-code-execution(35944)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35944" }, { "name": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2007.08.09.html" }, { "name": "1018547", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018547" }, { "name": "http://secunia.com/secunia_research/2007-53/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2007-53/advisory/" }, { "name": "ADV-2007-2822", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2822" }, { "name": "25215", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25215" }, { "name": "1018546", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018546" }, { "name": "24983", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24983" }, { "name": "1018545", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018545" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2007-2955", "datePublished": "2007-08-09T21:00:00", "dateReserved": "2007-05-31T00:00:00", "dateUpdated": "2024-08-07T13:57:54.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3456
Vulnerability from cvelistv5
Published
2007-05-11 10:00
Modified
2024-08-07 18:30
Severity ?
EPSS score ?
Summary
The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to "crash the control" via unspecified vectors related to content on a web site, and place Internet Explorer into a "defunct state" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771.
References
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/avcenter/security/Content/2007.05.09.html | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2007/1751 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/23822 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/25172 | third-party-advisory, x_refsource_SECUNIA | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529 | third-party-advisory, x_refsource_IDEFENSE | |
http://osvdb.org/35075 | vdb-entry, x_refsource_OSVDB | |
http://www.securitytracker.com/id?1018031 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34200 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" }, { "name": "ADV-2007-1751", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1751" }, { "name": "23822", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23822" }, { "name": "25172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25172" }, { "name": "20070509 Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529" }, { "name": "35075", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35075" }, { "name": "1018031", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018031" }, { "name": "symantec-navopts-security-bypass(34200)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to \"crash the control\" via unspecified vectors related to content on a web site, and place Internet Explorer into a \"defunct state\" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" }, { "name": "ADV-2007-1751", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1751" }, { "name": "23822", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23822" }, { "name": "25172", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25172" }, { "name": "20070509 Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529" }, { "name": "35075", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35075" }, { "name": "1018031", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018031" }, { "name": "symantec-navopts-security-bypass(34200)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to \"crash the control\" via unspecified vectors related to content on a web site, and place Internet Explorer into a \"defunct state\" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2007.05.09.html" }, { "name": "ADV-2007-1751", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1751" }, { "name": "23822", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23822" }, { "name": "25172", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25172" }, { "name": "20070509 Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529" }, { "name": "35075", "refsource": "OSVDB", "url": "http://osvdb.org/35075" }, { "name": "1018031", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018031" }, { "name": "symantec-navopts-security-bypass(34200)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3456", "datePublished": "2007-05-11T10:00:00", "dateReserved": "2006-07-07T00:00:00", "dateUpdated": "2024-08-07T18:30:33.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0312
Vulnerability from cvelistv5
Published
2008-04-08 17:00
Modified
2024-08-07 07:39
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1019753 | vdb-entry, x_refsource_SECTRACK | |
http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1019751 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id?1019752 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/29660 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2008/1077/references | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/28507 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41629 | vdb-entry, x_refsource_XF | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:39:35.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1019753", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019753" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" }, { "name": "1019751", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019751" }, { "name": "1019752", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019752" }, { "name": "29660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29660" }, { "name": "ADV-2008-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "name": "28507", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28507" }, { "name": "symantec-autofixtool-bo(41629)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41629" }, { "name": "20080402 Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1019753", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019753" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" }, { "name": "1019751", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019751" }, { "name": "1019752", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019752" }, { "name": "29660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29660" }, { "name": "ADV-2008-1077", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "name": "28507", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28507" }, { "name": "symantec-autofixtool-bo(41629)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41629" }, { "name": "20080402 Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1019753", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019753" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" }, { "name": "1019751", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019751" }, { "name": "1019752", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019752" }, { "name": "29660", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29660" }, { "name": "ADV-2008-1077", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "name": "28507", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28507" }, { "name": "symantec-autofixtool-bo(41629)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41629" }, { "name": "20080402 Symantec Norton Internet Security 2008 ActiveX Control Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0312", "datePublished": "2008-04-08T17:00:00", "dateReserved": "2008-01-16T00:00:00", "dateUpdated": "2024-08-07T07:39:35.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0994
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 02:12
Severity ?
EPSS score ?
Summary
The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/3428 | vdb-entry, x_refsource_OSVDB | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html | mailing-list, x_refsource_FULLDISC | |
http://marc.info/?l=bugtraq&m=107393473928245&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.secnetops.biz/research/SRT2004-01-09-1022.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3428", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/3428" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "name": "20040112 Re: SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107393473928245\u0026w=2" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3428", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/3428" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "name": "20040112 Re: SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107393473928245\u0026w=2" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3428", "refsource": "OSVDB", "url": "http://www.osvdb.org/3428" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "name": "20040112 Re: SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107393473928245\u0026w=2" }, { "name": "20040112 SRT2004-01-9-1022 - Symantec LiveUpdate allows local users to become SYSTEM", "refsource": "BUGTRAQ", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html" }, { "name": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt", "refsource": "MISC", "url": "http://www.secnetops.biz/research/SRT2004-01-09-1022.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0994", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2003-12-16T00:00:00", "dateUpdated": "2024-08-08T02:12:35.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1476
Vulnerability from cvelistv5
Published
2007-03-16 21:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855.
References
▼ | URL | Tags |
---|---|---|
http://www.symantec.com/avcenter/security/Content/2007.09.05.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/462926/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=full-disclosure&m=117396596027148&w=2 | mailing-list, x_refsource_FULLDISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33003 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22977 | vdb-entry, x_refsource_BID | |
http://osvdb.org/35088 | vdb-entry, x_refsource_OSVDB | |
http://securityreason.com/securityalert/2438 | third-party-advisory, x_refsource_SREASON | |
http://securitytracker.com/id?1018656 | vdb-entry, x_refsource_SECTRACK | |
http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:08.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35088" }, { "name": "2438", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018656" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35088" }, { "name": "2438", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018656" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver input buffer", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "name": "20070315 Norton Insufficient validation of \u0027SymTDI\u0027 driver", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "name": "symantec-firewall-symtdi-dos(33003)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "name": "22977", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22977" }, { "name": "35088", "refsource": "OSVDB", "url": "http://osvdb.org/35088" }, { "name": "2438", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2438" }, { "name": "1018656", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018656" }, { "name": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymTDI-driver-input-buffer.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1476", "datePublished": "2007-03-16T21:00:00", "dateReserved": "2007-03-16T00:00:00", "dateUpdated": "2024-08-07T12:59:08.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-3673
Vulnerability from cvelistv5
Published
2007-07-15 21:00
Modified
2024-08-07 14:28
Severity ?
EPSS score ?
Summary
Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\symTDI\, which results in memory overwrite.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/26042 | third-party-advisory, x_refsource_SECUNIA | |
http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35347 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/22351 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2007/2507 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/36117 | vdb-entry, x_refsource_OSVDB | |
http://securitytracker.com/id?1018372 | vdb-entry, x_refsource_SECTRACK | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554 | third-party-advisory, x_refsource_IDEFENSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:28:51.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "26042", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26042" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36117" }, { "name": "1018372", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "26042", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26042" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36117" }, { "name": "1018372", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3673", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec symtdi.sys before 7.0.0, as distributed in Symantec AntiVirus Corporate Edition 9 through 10.1 and Client Security 2.0 through 3.1, Norton AntiSpam 2005, and Norton AntiVirus, Internet Security, Personal Firewall, and System Works 2005 and 2006; allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in an IOCTL 0x83022323 request to \\\\symTDI\\, which results in memory overwrite." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "26042", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26042" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11d.html" }, { "name": "symantec-multi-symtdi-privilege-escalation(35347)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35347" }, { "name": "22351", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22351" }, { "name": "ADV-2007-2507", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2507" }, { "name": "36117", "refsource": "OSVDB", "url": "http://osvdb.org/36117" }, { "name": "1018372", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018372" }, { "name": "20070711 Symantec AntiVirus symtdi.sys Local Privilege Escalation Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=554" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3673", "datePublished": "2007-07-15T21:00:00", "dateReserved": "2007-07-10T00:00:00", "dateUpdated": "2024-08-07T14:28:51.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-5404
Vulnerability from cvelistv5
Published
2006-10-19 01:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1016988 | vdb-entry, x_refsource_SECTRACK | |
http://securitytracker.com/id?1016991 | vdb-entry, x_refsource_SECTRACK | |
http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html | x_refsource_CONFIRM | |
http://securitytracker.com/id?1016989 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2006/3929 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/22228 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1016990 | vdb-entry, x_refsource_SECTRACK | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29366 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/20348 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:48:30.398Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1016988", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "22228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016990" }, { "name": "symantec-support-tool-info-disclosure(29366)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29366" }, { "name": "20348", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20348" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1016988", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "22228", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016990" }, { "name": "symantec-support-tool-info-disclosure(29366)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29366" }, { "name": "20348", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20348" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5404", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1016988", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016988" }, { "name": "1016991", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016991" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html" }, { "name": "1016989", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016989" }, { "name": "ADV-2006-3929", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3929" }, { "name": "22228", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22228" }, { "name": "1016990", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016990" }, { "name": "symantec-support-tool-info-disclosure(29366)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29366" }, { "name": "20348", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20348" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5404", "datePublished": "2006-10-19T01:00:00", "dateReserved": "2006-10-18T00:00:00", "dateUpdated": "2024-08-07T19:48:30.398Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1793
Vulnerability from cvelistv5
Published
2007-04-02 22:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:26.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-1192", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021389" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34692" }, { "name": "1017838", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-1192", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021389" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34692" }, { "name": "1017838", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-1192", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "name": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php" }, { "name": "20070401 Norton Multiple insufficient argument validation of hooked SSDT function Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "name": "1021386", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021386" }, { "name": "1017837", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017837" }, { "name": "23241", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23241" }, { "name": "1021388", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021388" }, { "name": "1021389", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021389" }, { "name": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php", "refsource": "MISC", "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.12.12.html" }, { "name": "symantec-firewall-ssdt-dos(33352)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "name": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php", "refsource": "MISC", "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "name": "34692", "refsource": "OSVDB", "url": "http://osvdb.org/34692" }, { "name": "1017838", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017838" }, { "name": "1021387", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021387" }, { "name": "24677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24677" }, { "name": "20070918 Plague in (security) software drivers \u0026 BSDOhook utility", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1793", "datePublished": "2007-04-02T22:00:00", "dateReserved": "2007-04-02T00:00:00", "dateUpdated": "2024-08-07T13:06:26.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0166
Vulnerability from cvelistv5
Published
2006-01-11 21:00
Modified
2024-08-07 16:25
Severity ?
EPSS score ?
Summary
Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/0143 | vdb-entry, x_refsource_VUPEN | |
http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24061 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/18402 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1015462 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:25:34.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-0143", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0143" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html" }, { "name": "systemworks-nprotect-hidden(24061)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24061" }, { "name": "18402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18402" }, { "name": "1015462", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015462" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-0143", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0143" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html" }, { "name": "systemworks-nprotect-hidden(24061)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24061" }, { "name": "18402", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18402" }, { "name": "1015462", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015462" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Symantec Norton SystemWorks and SystemWorks Premier 2005 and 2006 stores temporary copies of files in the Norton Protected Recycle Bin NProtect directory, which is hidden from the FindFirst and FindNext Windows APIs and allows remote attackers to hide arbitrary files from virus scanners and other products." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-0143", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0143" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2006.01.10.html" }, { "name": "systemworks-nprotect-hidden(24061)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24061" }, { "name": "18402", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18402" }, { "name": "1015462", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015462" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0166", "datePublished": "2006-01-11T21:00:00", "dateReserved": "2006-01-11T00:00:00", "dateUpdated": "2024-08-07T16:25:34.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }