Vulnerability Name: | CVE-2004-1910 (CCN-15778) | ||||||||
Assigned: | 2004-04-06 | ||||||||
Published: | 2004-04-06 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | rufsi.dll in Symantec Virus Detection allows remote attackers to cause a denial of service (crash) via a long string to the GetPrivateProfileString function. Note: this issue was originally reported as a buffer overflow, but that specific claim is disputed by the vendor, although a crash is acknowledged. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Apr 08 2004 - 08:01:29 CDT Re: Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow, Apr 7 2004 2:22AM Source: CCN Type: Full-Disclosure Mailing List, Tue Apr 06 2004 - 21:22:37 CDT Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow Source: CCN Type: Full-Disclosure Mailing List, Wed Apr 07 2004 - 07:37:03 CDT Symantec, McAfee and Panda ActiveX controls Source: MITRE Type: CNA CVE-2004-1910 Source: FULLDISC Type: UNKNOWN 20040407 Symantec, McAfee and Panda ActiveX controls Source: BUGTRAQ Type: UNKNOWN 20040407 Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow Source: BUGTRAQ Type: UNKNOWN 20040408 Re: Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow, Apr 7 Source: CCN Type: OSVDB ID: 17988 Symantec Virus Detection rufsi.dll GetPrivateProfileString Function Remote DoS Source: BID Type: Exploit 10069 Source: CCN Type: BID-10069 Symantec Security Check Virus Detection COM Object Denial Of Service Vulnerability Source: XF Type: UNKNOWN symantec-sc-rufsi-bo(15778) Source: XF Type: UNKNOWN symantec-sc-rufsi-bo(15778) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |