{"vuid":"VU#637318","idnumber":"637318","name":"Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records","keywords":["Symantec","firewall products","buffer overflow","DNS requests and responses","resource records","canonical name","CNAME","AD20040512D","SYM04-008"],"overview":"There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.","clean_desc":"Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS requests and responses. There is a buffer overflow vulnerability in the routine responsible for processing incoming DNS packets. By supplying a specially crafted DNS resource record containing an overly long canonical name (CNAME) value, an attacker could cause a stack overflow allowing arbitrary code execution. According to the Symantec Advisory, the following products are affected: Consumer: Symantec Norton Internet Security and Professional 2002, 2003, 2004\nSymantec Norton Personal Firewall 2002, 2003, 2004\nSymantec Norton AntiSpam 2004 Corporate: Symantec Client Firewall 5.01, 5.1.1\nSymantec Client Security 1.0, 1.1, 2.0(SCF 7.1)","impact":"An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system.","resolution":"Apply Patch\nSymantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels. Use LiveUpdate\nSymantec recommends that clients running consumer versions of the affected products use the LiveUpdate feature to ensure all updates are installed. According to Symantec, this can be done as follows: Open any installed Symantec product\nClick on LiveUpdate in the toolbar\nRun LiveUpdate until Symantec LiveUpdate indicated that all installed Symantec products are up-to-date\nDepending on the application, system may require a reboot to effectively update available fixes","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \neEye Digital Security","author":"This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.","public":["http://www.eeye.com/html/Research/Advisories/AD20040512D.html","http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html","http://secunia.com/advisories/11066/"],"cveids":["CVE-2004-0444"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-05-13T12:33:04Z","publicdate":"2004-05-12T00:00:00Z","datefirstpublished":"2004-05-13T20:04:28Z","dateupdated":"2004-05-13T20:06:17Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"17","cam_scorecurrent":"23.90625","cam_scorecurrentwidelyknown":"28.6875","cam_scorecurrentwidelyknownexploited":"47.8125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":23.90625,"vulnote":null}