var-200407-0081
Vulnerability from variot
The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200407-0081", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 3.2, "vendor": "symantec", "version": null }, { "model": "norton antispam", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2004" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.2" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.8" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.5" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2002" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.4" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.3" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.6" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "1.9" }, { "model": "client firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "5.1.1" }, { "model": "client firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "5.01" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2003" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.0" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2002" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.7" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0" }, { "model": "client security", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af", "version": null }, { "model": "norton antispam", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af", "version": null }, { "model": "norton internet security", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af", "version": null }, { "model": "client firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af", "version": null }, { "model": "norton personal firewall", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af", "version": null }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20020" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20020" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" } ], "sources": [ { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "BID", "id": "10336" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "CNNVD", "id": "CNNVD-200407-003" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2002:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_firewall:5.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0445" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery of this vulnerability has been credited to Barnaby Jack, Karl Lynn and Derek Soeder.", "sources": [ { "db": "BID", "id": "10336" }, { "db": "CNNVD", "id": "CNNVD-200407-003" } ], "trust": 0.9 }, "cve": "CVE-2004-0445", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.6, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0445", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "VHN-8875", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0445", "trust": 1.8, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#637318", "trust": 0.8, "value": "23.91" }, { "author": "CARNEGIE MELLON", "id": "VU#294998", "trust": 0.8, "value": "15.54" }, { "author": "CARNEGIE MELLON", "id": "VU#682110", "trust": 0.8, "value": "9.56" }, { "author": "CARNEGIE MELLON", "id": "VU#634414", "trust": 0.8, "value": "21.09" }, { "author": "CNNVD", "id": "CNNVD-200407-003", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-8875", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "VULHUB", "id": "VHN-8875" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "CNNVD", "id": "CNNVD-200407-003" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges", "sources": [ { "db": "NVD", "id": "CVE-2004-0445" }, { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "BID", "id": "10336" }, { "db": "VULHUB", "id": "VHN-8875" } ], "trust": 4.86 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-8875", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-8875" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "11066", "trust": 5.7 }, { "db": "CERT/CC", "id": "VU#682110", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2004-0445", "trust": 3.6 }, { "db": "BID", "id": "10336", "trust": 2.8 }, { "db": "SECTRACK", "id": "1010144", "trust": 2.5 }, { "db": "SECTRACK", "id": "1010146", "trust": 2.5 }, { "db": "SECTRACK", "id": "1010145", "trust": 2.5 }, { "db": "OSVDB", "id": "6100", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#637318", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#294998", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#634414", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200407-003", "trust": 0.7 }, { "db": "CIAC", "id": "O-141", "trust": 0.6 }, { "db": "XF", "id": "16132", "trust": 0.6 }, { "db": "FULLDISC", "id": "20040512 EEYE: SYMANTEC MULTIPLE FIREWALL DNS RESPONSE DENIAL-OF-SERVICE", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "299", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-15311", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-8875", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "VULHUB", "id": "VHN-8875" }, { "db": "BID", "id": "10336" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "CNNVD", "id": "CNNVD-200407-003" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "id": "VAR-200407-0081", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8875" } ], "trust": 0.01 }, "last_update_date": "2024-06-06T23:06:44.146000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.2, "url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html" }, { "trust": 3.2, "url": "http://secunia.com/advisories/11066/" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/682110" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/10336" }, { "trust": 2.5, "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml" }, { "trust": 2.5, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-may/021359.html" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1010144" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1010145" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1010146" }, { "trust": 2.5, "url": "http://secunia.com/advisories/11066" }, { "trust": 1.9, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132" }, { "trust": 1.7, "url": "http://www.osvdb.org/6100" }, { "trust": 1.1, "url": "http://www.eeye.com/html/research/advisories/ad20040512b.html" }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20040512d.html" }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20040512c.html" }, { "trust": 0.8, "url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html " }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20040512a.html" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc1001.txt" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0445" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16132" }, { "trust": 0.3, "url": "/archive/1/363228" } ], "sources": [ { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "VULHUB", "id": "VHN-8875" }, { "db": "BID", "id": "10336" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "CNNVD", "id": "CNNVD-200407-003" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#637318" }, { "db": "CERT/CC", "id": "VU#294998" }, { "db": "CERT/CC", "id": "VU#682110" }, { "db": "CERT/CC", "id": "VU#634414" }, { "db": "VULHUB", "id": "VHN-8875" }, { "db": "BID", "id": "10336" }, { "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "db": "CNNVD", "id": "CNNVD-200407-003" }, { "db": "NVD", "id": "CVE-2004-0445" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#637318" }, { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#294998" }, { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#682110" }, { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#634414" }, { "date": "2004-07-07T00:00:00", "db": "VULHUB", "id": "VHN-8875" }, { "date": "2004-05-12T00:00:00", "db": "BID", "id": "10336" }, { "date": "2024-06-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "date": "2004-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200407-003" }, { "date": "2004-07-07T04:00:00", "db": "NVD", "id": "CVE-2004-0445" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#637318" }, { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#294998" }, { "date": "2004-05-13T00:00:00", "db": "CERT/CC", "id": "VU#682110" }, { "date": "2004-06-02T00:00:00", "db": "CERT/CC", "id": "VU#634414" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-8875" }, { "date": "2006-09-05T22:28:00", "db": "BID", "id": "10336" }, { "date": "2024-06-04T08:51:00", "db": "JVNDB", "id": "JVNDB-2004-000889" }, { "date": "2006-08-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200407-003" }, { "date": "2017-07-11T01:30:09.933000", "db": "NVD", "id": "CVE-2004-0445" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200407-003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records", "sources": [ { "db": "CERT/CC", "id": "VU#637318" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200407-003" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.