VAR-200407-0081
Vulnerability from variot - Updated: 2024-06-06 23:06The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200407-0081",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 3.2,
"vendor": "symantec",
"version": null
},
{
"model": "norton antispam",
"scope": "eq",
"trust": 1.9,
"vendor": "symantec",
"version": "2004"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.2"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.8"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.5"
},
{
"model": "norton internet security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "2002"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.4"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.3"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.6"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.6,
"vendor": "symantec",
"version": "1.9"
},
{
"model": "client firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "5.1.1"
},
{
"model": "client firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "5.01"
},
{
"model": "norton personal firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "2003"
},
{
"model": "norton internet security",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "2003"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "1.0"
},
{
"model": "norton personal firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "2004"
},
{
"model": "norton internet security",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "2004"
},
{
"model": "norton personal firewall",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "2002"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.3,
"vendor": "symantec",
"version": "1.1"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.0,
"vendor": "symantec",
"version": "1.7"
},
{
"model": "client security",
"scope": "eq",
"trust": 1.0,
"vendor": "symantec",
"version": "2.0"
},
{
"model": "client security",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
"version": null
},
{
"model": "norton antispam",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
"version": null
},
{
"model": "norton internet security",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
"version": null
},
{
"model": "client firewall",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
"version": null
},
{
"model": "norton personal firewall",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
"version": null
},
{
"model": "norton internet security professional edition",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "20020"
},
{
"model": "norton internet security professional edition",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "2004"
},
{
"model": "norton internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "20020"
},
{
"model": "client security (scf",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "2.07.1)"
},
{
"model": "norton internet security professional edition",
"scope": "eq",
"trust": 0.3,
"vendor": "symantec",
"version": "2003"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "BID",
"id": "10336"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_antispam:2004:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2002:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_firewall:5.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2004:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovery of this vulnerability has been credited to Barnaby Jack, Karl Lynn and Derek Soeder.",
"sources": [
{
"db": "BID",
"id": "10336"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
}
],
"trust": 0.9
},
"cve": "CVE-2004-0445",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 2.6,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2004-0445",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "VHN-8875",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-0445",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#637318",
"trust": 0.8,
"value": "23.91"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#294998",
"trust": 0.8,
"value": "15.54"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#682110",
"trust": 0.8,
"value": "9.56"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#634414",
"trust": 0.8,
"value": "21.09"
},
{
"author": "CNNVD",
"id": "CNNVD-200407-003",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-8875",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "VULHUB",
"id": "VHN-8875"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0445"
},
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "BID",
"id": "10336"
},
{
"db": "VULHUB",
"id": "VHN-8875"
}
],
"trust": 4.86
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-8875",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8875"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "SECUNIA",
"id": "11066",
"trust": 5.7
},
{
"db": "CERT/CC",
"id": "VU#682110",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2004-0445",
"trust": 3.6
},
{
"db": "BID",
"id": "10336",
"trust": 2.8
},
{
"db": "SECTRACK",
"id": "1010144",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1010146",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1010145",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "6100",
"trust": 1.7
},
{
"db": "CERT/CC",
"id": "VU#637318",
"trust": 0.8
},
{
"db": "CERT/CC",
"id": "VU#294998",
"trust": 0.8
},
{
"db": "CERT/CC",
"id": "VU#634414",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003",
"trust": 0.7
},
{
"db": "CIAC",
"id": "O-141",
"trust": 0.6
},
{
"db": "XF",
"id": "16132",
"trust": 0.6
},
{
"db": "FULLDISC",
"id": "20040512 EEYE: SYMANTEC MULTIPLE FIREWALL DNS RESPONSE DENIAL-OF-SERVICE",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "299",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-15311",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-8875",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "VULHUB",
"id": "VHN-8875"
},
{
"db": "BID",
"id": "10336"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"id": "VAR-200407-0081",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8875"
}
],
"trust": 0.01
},
"last_update_date": "2024-06-06T23:06:44.146000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 5.2,
"url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html"
},
{
"trust": 3.2,
"url": "http://secunia.com/advisories/11066/"
},
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/682110"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/10336"
},
{
"trust": 2.5,
"url": "http://www.ciac.org/ciac/bulletins/o-141.shtml"
},
{
"trust": 2.5,
"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-may/021359.html"
},
{
"trust": 2.5,
"url": "http://securitytracker.com/id?1010144"
},
{
"trust": 2.5,
"url": "http://securitytracker.com/id?1010145"
},
{
"trust": 2.5,
"url": "http://securitytracker.com/id?1010146"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/11066"
},
{
"trust": 1.9,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16132"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/6100"
},
{
"trust": 1.1,
"url": "http://www.eeye.com/html/research/advisories/ad20040512b.html"
},
{
"trust": 0.8,
"url": "http://www.eeye.com/html/research/advisories/ad20040512d.html"
},
{
"trust": 0.8,
"url": "http://www.eeye.com/html/research/advisories/ad20040512c.html"
},
{
"trust": 0.8,
"url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html "
},
{
"trust": 0.8,
"url": "http://www.eeye.com/html/research/advisories/ad20040512a.html"
},
{
"trust": 0.8,
"url": "http://www.ietf.org/rfc/rfc1001.txt"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0445"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/16132"
},
{
"trust": 0.3,
"url": "/archive/1/363228"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "VULHUB",
"id": "VHN-8875"
},
{
"db": "BID",
"id": "10336"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#637318"
},
{
"db": "CERT/CC",
"id": "VU#294998"
},
{
"db": "CERT/CC",
"id": "VU#682110"
},
{
"db": "CERT/CC",
"id": "VU#634414"
},
{
"db": "VULHUB",
"id": "VHN-8875"
},
{
"db": "BID",
"id": "10336"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#637318"
},
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#294998"
},
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#682110"
},
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#634414"
},
{
"date": "2004-07-07T00:00:00",
"db": "VULHUB",
"id": "VHN-8875"
},
{
"date": "2004-05-12T00:00:00",
"db": "BID",
"id": "10336"
},
{
"date": "2024-06-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"date": "2004-07-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"date": "2004-07-07T04:00:00",
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#637318"
},
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#294998"
},
{
"date": "2004-05-13T00:00:00",
"db": "CERT/CC",
"id": "VU#682110"
},
{
"date": "2004-06-02T00:00:00",
"db": "CERT/CC",
"id": "VU#634414"
},
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-8875"
},
{
"date": "2006-09-05T22:28:00",
"db": "BID",
"id": "10336"
},
{
"date": "2024-06-04T08:51:00",
"db": "JVNDB",
"id": "JVNDB-2004-000889"
},
{
"date": "2006-08-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200407-003"
},
{
"date": "2017-07-11T01:30:09.933000",
"db": "NVD",
"id": "CVE-2004-0445"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records",
"sources": [
{
"db": "CERT/CC",
"id": "VU#637318"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200407-003"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…