CVE-2004-0444

Current Description

Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components.

Basic Data

PublishedJuly 07, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSymantecClient Firewall5.01*******
    2.3ApplicationSymantecClient Firewall5.1.1*******
    2.3ApplicationSymantecClient Security1.0*******
    2.3ApplicationSymantecClient Security1.1*******
    2.3ApplicationSymantecClient Security1.2*******
    2.3ApplicationSymantecClient Security1.3*******
    2.3ApplicationSymantecClient Security1.4*******
    2.3ApplicationSymantecClient Security1.5*******
    2.3ApplicationSymantecClient Security1.6*******
    2.3ApplicationSymantecClient Security1.7*******
    2.3ApplicationSymantecClient Security1.8*******
    2.3ApplicationSymantecClient Security1.9*******
    2.3ApplicationSymantecClient Security2.0*******
    2.3ApplicationSymantecNorton Antispam2004*******
    2.3ApplicationSymantecNorton Internet Security2002*******
    2.3ApplicationSymantecNorton Internet Security2002*pro*****
    2.3ApplicationSymantecNorton Internet Security2003*******
    2.3ApplicationSymantecNorton Internet Security2003*pro*****
    2.3ApplicationSymantecNorton Internet Security2004*******
    2.3ApplicationSymantecNorton Internet Security2004*pro*****
    2.3ApplicationSymantecNorton Personal Firewall2002*******
    2.3ApplicationSymantecNorton Personal Firewall2003*******
    2.3ApplicationSymantecNorton Personal Firewall2004*******

Vulnerable Software List

VendorProductVersions
Symantec Norton Antispam 2004
Symantec Client Firewall 5.01, 5.1.1
Symantec Norton Internet Security 2002, 2003, 2004
Symantec Client Security 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0
Symantec Norton Personal Firewall 2002, 2003, 2004

References

NameSourceURLTags
20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflowhttp://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.htmlFULLDISC
20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflowhttp://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.htmlFULLDISC
20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruptionhttp://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.htmlFULLDISC
11066http://secunia.com/advisories/11066SECUNIA
http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.htmlhttp://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.htmlCONFIRM
1010144http://securitytracker.com/id?1010144SECTRACK
1010145http://securitytracker.com/id?1010145SECTRACK
1010146http://securitytracker.com/id?1010146SECTRACK
O-141http://www.ciac.org/ciac/bulletins/o-141.shtmlCIAC
VU#294998http://www.kb.cert.org/vuls/id/294998CERT-VNPATCH Third Party Advisory US Government Resource
VU#634414http://www.kb.cert.org/vuls/id/634414CERT-VNPATCH Third Party Advisory US Government Resource
VU#637318http://www.kb.cert.org/vuls/id/637318CERT-VNUS Government Resource
6099http://www.osvdb.org/6099OSVDB
6101http://www.osvdb.org/6101OSVDB
6102http://www.osvdb.org/6102OSVDB
10333http://www.securityfocus.com/bid/10333BID
10334http://www.securityfocus.com/bid/10334BID
10335http://www.securityfocus.com/bid/10335BID
symantec-nbns-response-bo(16134)https://exchange.xforce.ibmcloud.com/vulnerabilities/16134XF
symantec-firewalls-nbns-bo(16135)https://exchange.xforce.ibmcloud.com/vulnerabilities/16135XF
symantec-dns-response-bo(16137)https://exchange.xforce.ibmcloud.com/vulnerabilities/16137XF