|
|
|
|
| |
Credit:
The original article can be found at: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0444
The original article can be found at: http://www.securityfocus.com/bid/10334
|
| |
Vulnerable Systems:
* Symantec Norton Personal Firewall 2004
* Symantec Norton Personal Firewall 2003
* Symantec Norton Personal Firewall 2002
* Symantec Norton Internet Security 2004 Professional Edition
* Symantec Norton Internet Security 2004
* Symantec Norton Internet Security 2003 Professional Edition
* Symantec Norton Internet Security 2003
* Symantec Norton Internet Security 2002 Professional Edition 0
* Symantec Norton Internet Security 2002 0
* Symantec Norton AntiSpam 2004
* Symantec Client Security 2.0 (SCF 7.1)
* Symantec Client Security 1.1
* Symantec Client Security 1.0
* Symantec Client Firewall 5.1.1
* Symantec Client Firewall 5.0 1
A remotely exploitable buffer overflow vulnerability has been reported in various Symantec Firewall Products. Affected products include Norton Internet Security, Norton Personal Firewall, Norton AntiSpam, Client Firewall, and Client Security.
The issue is due to insufficient bounds checking of DNS response data and may be exploited to gain SYSTEM/kernel level access to a computer hosting the vulnerable software.
The source of the vulnerability is that the CNAME (Canonical Name) data field specified in incoming DNS Resource Records is copied into an internal buffer in an insecure manner, resulting in a stack-based buffer overflow.
Vendor Status:
Symantec as issued an update for this vulnerablity
Patch Availability:
http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html
CVE Information:
CVE-2004-0444
|
|
|
|
|