CVE-2007-0447 – Symantec AntiVirus Engine CAB Parsing Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-0447
Heap-based buffer overflow in the Decomposer component in multiple Symantec products allows remote attackers to execute arbitrary code via multiple crafted CAB archives. Desbordamiento de búfer basado en pila en el componente Decomposer en múltiples producto Symantec que permiten a atacantes remotos ejecutar código de su elección a través de archivos .CAB manipulados. This vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of Symantec's AntiVirus Engine. User interaction is not required to exploit this vulnerability. The specific flaw exists during the process of scanning multiple maliciously formatted CAB archives. The parsing routine implicitly trusts certain user-supplied values that can result in an exploitable heap corruption. • http://osvdb.org/36118 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-040.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3699 – Symantec AntiVirus Engine RAR File Parsing DoS Vulnerability
https://notcve.org/view.php?id=CVE-2007-3699
The Decomposer component in multiple Symantec products allows remote attackers to cause a denial of service (infinite loop) via a certain value in the PACK_SIZE field of a RAR archive file header. El componente Decomposer en múltiples productos Symantec permite a atacantes remotos provocar denegación de servicio (bucles infinitos) a través de ciertos valores en el campo PACK_SIZE de una cabecera de archivo RAR. This vulnerability allows attackers to create a denial of service condition on software with vulnerable installations of the Symantec's AntiVirus engine. Authentication is not required to exploit this vulnerability. The specific flaw resides in a forged PACK_SIZE field of a RAR file header. By setting this field to a specific value an infinite loop denial of service condition will occur when the scanner processes the file. • http://osvdb.org/36119 http://secunia.com/advisories/26053 http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11f.html http://www.securityfocus.com/bid/24282 http://www.vupen.com/english/advisories/2007/2508 http://www.zerodayinitiative.com/advisories/ZDI-07-039.html •
CVE-2004-0445 – Symantec Multiple Firewall - DNS Response Denial of Service
https://notcve.org/view.php?id=CVE-2004-0445
The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself. El controlador SYMDNS.SYS de Symantec Norton Internet Security y Professional 2002 a 2004, Norton Personal Firewall 2002 a 2004, Norton AntiSpam 2004, Client Firewall 5.01 y 5.1.1, Client Securiy 1.0 a 2.0 permite a atacantes remotos causar una denegación de servicio (consumición de CPU en un buble infinito) mediante una respuesta DNS con un puntero de nombre comprimido que apunta a sí mismo. • https://www.exploit-db.com/exploits/299 http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html http://secunia.com/advisories/11066 http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html http://securitytracker.com/id?1010144 http://securitytracker.com/id?1010145 http://securitytracker.com/id?1010146 http://www.ciac.org/ciac/bulletins/o-141.shtml http://www.kb.cert.org/vuls/id/682110 http://www.osvdb.org/6100 http://www.securityf •
CVE-2004-0444
https://notcve.org/view.php?id=CVE-2004-0444
Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components. Múltiples vulenrabilidades en SYMDNS.SYS de Symantec Noton Internet Security y Professional 2002 a 2004, Norton Persnoal Firewall 2002 a 2004, Norton AntiSpam 2004, Client Firewal 5.01 y 5.1.1, y Client Security 1.0 a 2.0 permite a atacantes remotos causar una denegación de servicio o ejecutar código de su elección mediante (1) un byte de longitud manipulado en la rutina de decodificación de primer nivel del Servicio de Nombres de NetBIOS (NBNS) que modifica una variable de índice que conduce a un desbordamiento de búfer en la pila, (2) un problema de corrupción del montón en una respuesta NBNS a la que le faltan ciertos campor RR, y (3) un desbordamiento de búfer basado en la pila en el componente DNS mediante un Registro de Recurso (RR) con un nombre canónico (CNAME) largo compuest de muchos componentes más pequeños. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021360.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021361.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021362.html http://secunia.com/advisories/11066 http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html http://securitytracker.com/id?1010144 http://securitytracker.com/id?1010145 http://securitytracker.com/id?1010146 http://www.ciac.org/ciac/bulletins/o-141. •
CVE-2003-0994
https://notcve.org/view.php?id=CVE-2003-0994
The GUI functionality for an interactive session in Symantec LiveUpdate 1.70.x through 1.90.x, as used in Norton Internet Security 2001 through 2004, SystemWorks 2001 through 2004, and AntiVirus and Norton AntiVirus Pro 2001 through 2004, AntiVirus for Handhelds v3.0, allows local users to gain SYSTEM privileges. La funcionalidad gui para una sesión interactiva en ymantec LiveUpdate 1.70.x hasta la 1.90.x (usadas en Norton Internet Security 2001 hasta 2004, SystemWorks 2001 hasta 2004, y AntiVirus y Norton AntiVirus Pro 2001 hasta 2004, AntiVirus for Handhelds v3.0) permite que usuarios locales obtengan privilegios SYSTEM. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015510.html http://marc.info/?l=bugtraq&m=107393473928245&w=2 http://www.osvdb.org/3428 http://www.secnetops.biz/research/SRT2004-01-09-1022.txt •