Vulnerability Name: CVE-2004-0444 (CCN-16134) Assigned: 2004-05-12 Published: 2004-05-12 Updated: 2017-07-11 Summary: Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: Full-Disclosure Mailing List, Wed May 12 2004 - 19:02:46 CDTEEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption Source: MITRE Type: CNACVE-2004-0444 Source: FULLDISC Type: UNKNOWN20040512 EEYE: Symantec Multiple Firewall NBNS Response Processing Stack Overflow Source: FULLDISC Type: UNKNOWN20040512 EEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow Source: FULLDISC Type: UNKNOWN20040512 EEYE: Symantec Multiple Firewall NBNS Response Remote Heap Corruption Source: CCN Type: SA11066Symantec Client Firewall Products Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN11066 Source: CCN Type: Symantec Security Response SYM04-008Symantec Client Firewall Remote Access and Denial of Service Issues Source: CONFIRM Type: UNKNOWNhttp://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html Source: CCN Type: SECTRACK ID: 1010144Symantec Client Firewall SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: SECTRACK Type: UNKNOWN1010144 Source: CCN Type: SECTRACK ID: 1010145Symantec Client Security SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: SECTRACK Type: UNKNOWN1010145 Source: CCN Type: SECTRACK ID: 1010146Norton AntiSpam SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: SECTRACK Type: UNKNOWN1010146 Source: CCN Type: CIAC Information Bulletin O-141Symantec Client Firewall Remote Access Vulnerabilities Source: CIAC Type: UNKNOWNO-141 Source: CCN Type: US-CERT VU#294998Multiple Symantec firewall products contain a heap corruption vulnerability in the handling of NBNS response packets Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#294998 Source: CCN Type: US-CERT VU#634414Multiple Symantec firewall products fail to properly process NBNS response packets Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#634414 Source: CCN Type: US-CERT VU#637318Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records Source: CERT-VN Type: US Government ResourceVU#637318 Source: OSVDB Type: UNKNOWN6099 Source: OSVDB Type: UNKNOWN6101 Source: OSVDB Type: UNKNOWN6102 Source: CCN Type: OSVDB ID: 6099Symantec Multiple Firewall NBNS Response Processing Overflow Source: CCN Type: OSVDB ID: 6101Symantec Multiple Firewall NBNS Response Remote Heap Corruption Source: CCN Type: OSVDB ID: 6102Symantec Multiple Firewall Remote DNS KERNEL Overflow Source: BID Type: UNKNOWN10333 Source: CCN Type: BID-10333Symantec Client Firewall NetBIOS Name Service Response Buffer Overflow Vulnerability Source: BID Type: UNKNOWN10334 Source: CCN Type: BID-10334Symantec Client Firewall DNS Response Buffer Overflow Vulnerability Source: BID Type: UNKNOWN10335 Source: CCN Type: BID-10335Symantec Client Firewall NetBIOS Handler Remote Heap Overflow Vulnerability Source: XF Type: UNKNOWNsymantec-nbns-response-bo(16134) Source: XF Type: UNKNOWNsymantec-nbns-response-bo(16134) Source: XF Type: UNKNOWNsymantec-firewalls-nbns-bo(16135) Source: XF Type: UNKNOWNsymantec-dns-response-bo(16137) Vulnerable Configuration: Configuration 1 :cpe:/a:symantec:client_firewall:5.01:*:*:*:*:*:*:* OR cpe:/a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.0:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.1:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.2:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.3:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.4:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.5:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.6:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.7:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.8:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.9:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:2.0:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_antispam:2004:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2002:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2002:*:pro:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2003:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2003:*:pro:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2004:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2004:*:pro:*:*:*:*:* OR cpe:/a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2004-0444 (CCN-16137) Assigned: 2004-05-12 Published: 2004-05-12 Updated: 2004-05-12 Summary: Symantec Norton Internet Security is vulnerable to a stack-based buffer overflow, caused by improper bounds checking of the CNAME field in the SYMDNS.SYS driver. A remote attacker can send a Domain Name System (DNS) response with a long canonical name to overflow a buffer and execute arbitrary code on the system with kernel-level privileges. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: Full-Disclosure Mailing List, Wed May 12 2004 - 19:04:14 CDTEEYE: Symantec Multiple Firewall Remote DNS KERNEL Overflow Source: MITRE Type: CNACVE-2004-0444 Source: CCN Type: SA11066Symantec Client Firewall Products Multiple Vulnerabilities Source: CCN Type: Symantec Security Response SYM04-008Symantec Client Firewall Remote Access and Denial of Service Issues Source: CCN Type: SECTRACK ID: 1010144Symantec Client Firewall SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: CCN Type: SECTRACK ID: 1010145Symantec Client Security SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: CCN Type: SECTRACK ID: 1010146Norton AntiSpam SYMDNS.SYS Driver Lets Remote Users Execute Arbitrary Code to Take Full Control of the System Source: CCN Type: CIAC Information Bulletin O-141Symantec Client Firewall Remote Access Vulnerabilities Source: CCN Type: US-CERT VU#294998Multiple Symantec firewall products contain a heap corruption vulnerability in the handling of NBNS response packets Source: CCN Type: US-CERT VU#634414Multiple Symantec firewall products fail to properly process NBNS response packets Source: CCN Type: US-CERT VU#637318Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records Source: CCN Type: OSVDB ID: 6099Symantec Multiple Firewall NBNS Response Processing Overflow Source: CCN Type: OSVDB ID: 6101Symantec Multiple Firewall NBNS Response Remote Heap Corruption Source: CCN Type: OSVDB ID: 6102Symantec Multiple Firewall Remote DNS KERNEL Overflow Source: CCN Type: BID-10333Symantec Client Firewall NetBIOS Name Service Response Buffer Overflow Vulnerability Source: CCN Type: BID-10334Symantec Client Firewall DNS Response Buffer Overflow Vulnerability Source: CCN Type: BID-10335Symantec Client Firewall NetBIOS Handler Remote Heap Overflow Vulnerability Source: XF Type: UNKNOWNsymantec-dns-response-bo(16137) Vulnerable Configuration: Configuration CCN 1 :cpe:/a:symantec:norton_personal_firewall:2002:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2003:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_personal_firewall:2003:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2004:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:* OR cpe:/a:symantec:norton_personal_firewall:2004:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_antispam:2004:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2002:*:*:*:*:*:*:* OR cpe:/a:symantec:norton_internet_security:2003:*:professional:*:*:*:*:* OR cpe:/a:symantec:client_firewall:5.01:*:*:*:*:*:*:* OR cpe:/a:symantec:client_firewall:5.1.1:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:2.0:*:*:*:*:*:*:* AND cpe:/a:symantec:client_security:1.0:*:*:*:*:*:*:* OR cpe:/a:symantec:client_security:1.1:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
symantec client firewall 5.01
symantec client firewall 5.1.1
symantec client security 1.0
symantec client security 1.1
symantec client security 1.2
symantec client security 1.3
symantec client security 1.4
symantec client security 1.5
symantec client security 1.6
symantec client security 1.7
symantec client security 1.8
symantec client security 1.9
symantec client security 2.0
symantec norton antispam 2004
symantec norton internet security 2002
symantec norton internet security 2002
symantec norton internet security 2003
symantec norton internet security 2003
symantec norton internet security 2004
symantec norton internet security 2004
symantec norton personal firewall 2002
symantec norton personal firewall 2003
symantec norton personal firewall 2004
symantec norton personal firewall 2002
symantec norton internet security 2003
symantec norton personal firewall 2003
symantec norton internet security 2004
symantec norton internet security 2004
symantec norton personal firewall 2004
symantec norton antispam 2004
symantec norton internet security 2002
symantec norton internet security 2003
symantec client firewall 5.01
symantec client firewall 5.1.1
symantec client security 2.0
symantec client security 1.0
symantec client security 1.1