var-200705-0001
Vulnerability from variot

The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to "crash the control" via unspecified vectors related to content on a web site, and place Internet Explorer into a "defunct state" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771. (2) Internet Explorer The "defunc state" Regardless of the setting for whether scripting is safe or not. Symantec ActiveX An arbitrary code execution vulnerability exists with the control. This vulnerability E-mail Auto-Protect However, the problem is CVE-2007-3771 Has been assigned.A third party may be affected by: (1) " Crash control " There is a possibility that. (2) other Symantec ActiveX Arbitrary code, including controls, could be executed. An attacker may exploit this issue by enticing victims into opening a maliciously crafted HTML document. Successful exploits will allow attackers to execute arbitrary code in the context of the user visiting a malicious web page. Failed exploit attempts will likely result in denial-of-service conditions. Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability

iDefense Security Advisory 05.09.07 http://labs.idefense.com/intelligence/vulnerabilities/ May 09, 2007

I. BACKGROUND

Norton Internet Security 2006 is a comprehensive system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic. More information can be found on the vendors site at the following URL.

http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2006

II. When this control is loaded in a standard browser window, it throws an error during initialization which leaves the browser in a defunct state. After the error dialog displays, other Symantec ActiveX Controls can be created without error even if they are not marked as safe for scripting. This can lead to remote code execution if the unsafe controls contain exploitable methods.

III.

IV. DETECTION

iDefense confirmed the existence of this vulnerability within version 12.2.0.13 of NavOpts.dll as distributed with Norton Internet Security 2006. Prior versions are suspected to be vulnerable.

V. Although this will prevent potential exploitation, it may also negatively impact the functionality of the application.

VI. VENDOR RESPONSE

Symantec has addressed this vulnerability with a software update. The update is available via their LiveUpdate channels. For more information, consult their advisory at the following URL.

http://www.symantec.com/avcenter/security/Content/2007.05.09.html

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-3456 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

12/13/2006 Initial vendor notification 12/13/2006 Initial vendor response 05/09/2007 Coordinated public disclosure

IX. CREDIT

This vulnerability was reported to iDefense by Peter Vreugdenhil.

Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events http://labs.idefense.com/

X. LEGAL NOTICES

Copyright \xa9 2007 iDefense, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.

Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/

The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. This can be exploited to e.g.

Set the kill-bit for the affected ActiveX control.

PROVIDED AND/OR DISCOVERED BY: Discovered by Peter Vreugdenhil and reported via iDefense Labs.

ORIGINAL ADVISORY: Symantec: http://www.symantec.com/avcenter/security/Content/2007.05.09.html

iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0001",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2006"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": "norton system works",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2006"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2006"
      },
      {
        "model": "norton system works",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "12.2.0.13"
      },
      {
        "model": "norton internet security",
        "scope": null,
        "trust": 0.8,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": "norton systemworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "2005 and  2006"
      },
      {
        "model": "norton systemworks",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "20060"
      },
      {
        "model": "norton systemworks",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "20050"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "20060"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "23822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:2005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_system_works:2005:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Peter Vreugdenhil",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-3456",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 8.5,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2006-3456",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.8,
            "id": "VHN-19564",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2006-3456",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200705-231",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-19564",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to \"crash the control\" via unspecified vectors related to content on a web site, and place Internet Explorer into a \"defunct state\" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting.  NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771. (2) Internet Explorer The \"defunc state\" Regardless of the setting for whether scripting is safe or not. Symantec ActiveX An arbitrary code execution vulnerability exists with the control. This vulnerability E-mail Auto-Protect However, the problem is CVE-2007-3771 Has been assigned.A third party may be affected by: (1) \" Crash control \" There is a possibility that. (2) other Symantec ActiveX Arbitrary code, including controls, could be executed. \nAn attacker may exploit this issue by enticing victims into opening a maliciously crafted HTML document. \nSuccessful exploits will allow attackers to execute arbitrary code in the context of the user visiting a malicious web page. Failed exploit attempts will likely result in denial-of-service conditions. Symantec Norton Internet Security 2006 COM Object Security ByPass\nVulnerability\n\niDefense Security Advisory 05.09.07\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nMay 09, 2007\n\nI. BACKGROUND\n\nNorton Internet Security 2006 is a comprehensive system security suite\nthat offers protection from spyware, viruses, identity theft, spam, and\nmalicious network traffic. More information can be found on the vendors\nsite at the following URL. \n\nhttp://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is\u0026pvid=nis2006\n\nII. When this control is\nloaded in a standard browser window, it throws an error during\ninitialization which leaves the browser in a defunct state. After the\nerror dialog displays, other Symantec ActiveX Controls can be created\nwithout error even if they are not marked as safe for scripting. This\ncan lead to remote code execution if the unsafe controls contain\nexploitable methods. \n\nIII. \n\nIV. DETECTION\n\niDefense confirmed the existence of this vulnerability within version\n12.2.0.13 of NavOpts.dll as distributed with Norton Internet Security\n2006. Prior versions are suspected to be vulnerable. \n\nV. Although this will prevent potential\nexploitation, it may also negatively impact the functionality of the\napplication. \n\nVI. VENDOR RESPONSE\n\nSymantec has addressed this vulnerability with a software update. The\nupdate is available via their LiveUpdate channels. For more\ninformation, consult their advisory at the following URL. \n\nhttp://www.symantec.com/avcenter/security/Content/2007.05.09.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2006-3456 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n12/13/2006  Initial vendor notification\n12/13/2006  Initial vendor response\n05/09/2007  Coordinated public disclosure\n\nIX. CREDIT\n\nThis vulnerability was reported to iDefense by Peter Vreugdenhil. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2007 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nJoin the FREE BETA test of the Network Software Inspector (NSI)!\nhttp://secunia.com/network_software_inspector/\n\nThe NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \nThis can be exploited to e.g. \n\nSet the kill-bit for the affected ActiveX control. \n\nPROVIDED AND/OR DISCOVERED BY:\nDiscovered by Peter Vreugdenhil and reported via iDefense Labs. \n\nORIGINAL ADVISORY:\nSymantec:\nhttp://www.symantec.com/avcenter/security/Content/2007.05.09.html\n\niDefense Labs:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "BID",
        "id": "23822"
      },
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "db": "PACKETSTORM",
        "id": "56638"
      }
    ],
    "trust": 2.16
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-19564",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-3456",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "23822",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "25172",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-1751",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1018031",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "35075",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "34200",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20070509 SYMANTEC NORTON INTERNET SECURITY 2006 COM OBJECT SECURITY BYPASS VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "56632",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-19564",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "56638",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "BID",
        "id": "23822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "db": "PACKETSTORM",
        "id": "56638"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "id": "VAR-200705-0001",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:58:20.830000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SYM07-005",
        "trust": 0.8,
        "url": "http://www.symantec.com/avcenter/security/content/2007.05.09.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "http://www.symantec.com/avcenter/security/content/2007.05.09.html"
      },
      {
        "trust": 1.8,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/23822"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1018031"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/25172"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/35075"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2007/1751"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34200"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3456"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3456"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/34200"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/1751"
      },
      {
        "trust": 0.3,
        "url": "http://support.microsoft.com/kb/240797"
      },
      {
        "trust": 0.3,
        "url": "http://www.symantec.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/468116"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/),"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-3456"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php"
      },
      {
        "trust": 0.1,
        "url": "http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is\u0026pvid=nis2006"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4009/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6635/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/network_software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4848/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6636/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/25172/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4847/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6634/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "BID",
        "id": "23822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "db": "PACKETSTORM",
        "id": "56638"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "db": "BID",
        "id": "23822"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "db": "PACKETSTORM",
        "id": "56638"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-05-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "date": "2007-05-09T00:00:00",
        "db": "BID",
        "id": "23822"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "date": "2007-05-10T03:56:05",
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "date": "2007-05-11T00:35:58",
        "db": "PACKETSTORM",
        "id": "56638"
      },
      {
        "date": "2007-05-11T10:19:00",
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "date": "2007-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-19564"
      },
      {
        "date": "2007-05-10T02:49:00",
        "db": "BID",
        "id": "23822"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      },
      {
        "date": "2017-07-20T01:32:19.740000",
        "db": "NVD",
        "id": "CVE-2006-3456"
      },
      {
        "date": "2007-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "56632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Norton AntiVirus Used in etc.  Symantec NAVOPTS.DLL ActiveX Control crash vulnerability in control",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-004818"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200705-231"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.