{"vuid":"VU#344718","idnumber":"344718","name":"Norton AntiSpam contains boundary error within the \"SymSpamHelper Class\" (symspam.dll) ActiveX component.","keywords":["Norton AntiSpam","buffer overflow","SymSpamHelper","symspam.dll","ActiveX","LaunchCustomRuleWizard"],"overview":"Symantec's Norton AntiSpam is a software package that provides spam filtering. A vulnerability in an ActiveX control that ships with Norton AntiSpam may permit a remote attacker to execute arbitrary code on the local system.","clean_desc":"Symantec Norton AntiSpam for Windows installs the SymSpamHelper Class (symspam.dll), an ActiveX control that is marked safe for scripting. The ActiveX control contains a buffer overflow vulnerability that may be remotely exploited. Using the \"LaunchCustomRuleWizard\" method an attacker may be able to exploit a buffer overflow in the control to run arbitrary code on the target system. The victim must open a malicious web page or HTML-formatted email message in order for this vulnerability to be exploited remotely.","impact":"An attacker may be able to exploit this vulnerable to execute arbitrary code on the target system with elevated privileges.","resolution":"According to the Symantec advisory, customers should run Symantec LiveUpdate manually to ensure all installed Symantec products are fully updated. Open any installed Symantec product \nClick on LiveUpdate in the toolbar \nRun LiveUpdate until all available Symantec product updates are downloaded and installed","workarounds":"","sysaffected":"","thanks":"Thanks to NGSSoftware Insight Security Research for reporting this vulnerability.","author":"This document was written by Jason A Rafail and is based on information provided by NGSSoftware Insight Security Research and Symantec.","public":["http://www.sarc.com/avcenter/security/Content/2004.03.19.html","http://www.ngssoftware.com/advisories/antispam.txt","http://secunia.com/advisories/11169/"],"cveids":["CVE-2004-0363"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-03-19T18:53:43Z","publicdate":"2004-03-19T00:00:00Z","datefirstpublished":"2004-03-25T19:50:33Z","dateupdated":"2004-03-25T19:50:43Z","revision":5,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"17","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"15.3","cam_scorecurrentwidelyknown":"19.125","cam_scorecurrentwidelyknownexploited":"34.425","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.3,"vulnote":null}