VAR-200303-0032
Vulnerability from variot - Updated: 2023-12-18 11:43The client for Symantec Norton AntiVirus Corporate Edition 7.5.x before 7.5.1 Build 62 and 7.6.x before 7.6.1 Build 35a runs winhlp32 with raised privileges, which allows local users to gain privileges by using certain features of winhlp32. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. This issue may occur in applications or services where the Help function is not called in a secure manner. An example of this is when Anti-virus software or a personal firewall is running on the local system with the privileges of an administrator on the local system, and has an interface to "communicate" with the user. ISIHARA Takanori reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A user may gain unauthorized access to resources on the system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200303-0032",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "norton antivirus",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "corporate_7.5"
},
{
"model": "norton antivirus",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "corporate_7.6"
},
{
"model": "norton antivirus",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "corporate_7.51"
},
{
"model": "norton antivirus",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "corporate edition prior to 7.5.1 build 62"
},
{
"model": "norton antivirus",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "corporate edition prior to 7.6.1 build 35a"
},
{
"model": "antivirus",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "corporate edition 9.0.1 upgrade to mr3 or later"
},
{
"model": "antivirus",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "corporate edition 9.0.2 upgrade to mr3 or later"
},
{
"model": "antivirus",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "edition 9.0 upgrade to mr3 or later"
},
{
"model": "client security",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "2.0 upgrade to mr3 or later"
},
{
"model": "client security",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "2.0.1 upgrade to mr3 or later"
},
{
"model": "client security",
"scope": "eq",
"trust": 0.8,
"vendor": "symantec",
"version": "2.0.2 upgrade to mr3 or later"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:corporate_7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:corporate_7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:corporate_7.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-1540"
}
]
},
"cve": "CVE-2002-1540",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 7.2,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2011-000026",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-5925",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2002-1540",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2011-000026",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200303-085",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-5925",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-5925"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The client for Symantec Norton AntiVirus Corporate Edition 7.5.x before 7.5.1 Build 62 and 7.6.x before 7.6.1 Build 35a runs winhlp32 with raised privileges, which allows local users to gain privileges by using certain features of winhlp32. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. This issue may occur in applications or services where the Help function is not called in a secure manner. An example of this is when Anti-virus software or a personal firewall is running on the local system with the privileges of an administrator on the local system, and has an interface to \"communicate\" with the user. ISIHARA Takanori reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A user may gain unauthorized access to resources on the system",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "VULHUB",
"id": "VHN-5925"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2002-1540",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "6258",
"trust": 1.7
},
{
"db": "JVN",
"id": "JVN63898867",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026",
"trust": 0.8
},
{
"db": "BUGTRAQ",
"id": "20021025 RE: DH TEAM: NORTON ANTIVIRUS CORPORATE EDITION PRIVILEGE ESCALATION, HTTP://ONLINE.SECURITYFOCUS.COM/ARCHIVE/1/296979/2002-10-22/2002-10-28/0",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20021024 DH TEAM: NORTON ANTIVIRUS CORPORATE EDITION PRIVILEGE ESCALATION",
"trust": 0.6
},
{
"db": "XF",
"id": "32",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-5925",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-5925"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"id": "VAR-200303-0032",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-5925"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:43:34.599000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security, services and the interactive desktop in Windows",
"trust": 0.8,
"url": "http://support.microsoft.com/kb/327618/en-us"
},
{
"title": "SYM05-012 ",
"trust": 0.8,
"url": "http://www.symantec.com/avcenter/security/content/2005.08.24.html"
},
{
"title": "October 15, 2002 Symantec Norton AntiVirus Corporate Edition 7.x Help File Elevation of Privilege",
"trust": 0.8,
"url": "http://www.symantec.com/avcenter/security/content/2002.10.15.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-264",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0346.html"
},
{
"trust": 1.7,
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0369.html"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/6258"
},
{
"trust": 1.7,
"url": "http://www.iss.net/security_center/static/10475.php"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1540"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2017"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn63898867"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2002-1540"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-2017"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-5925"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-5925"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2003-03-31T00:00:00",
"db": "VULHUB",
"id": "VHN-5925"
},
{
"date": "2011-05-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"date": "2003-03-31T05:00:00",
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"date": "2003-03-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2008-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-5925"
},
{
"date": "2011-05-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000026"
},
{
"date": "2008-09-10T19:14:51.070000",
"db": "NVD",
"id": "CVE-2002-1540"
},
{
"date": "2006-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Applications that use the Windows Help function may be vulnerable to privilege escalation",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-000026"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "unknown",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200303-085"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.