7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.941 High
EPSS
Percentile
99.2%
Symantec’s Norton AntiSpam is a software package that provides spam filtering. A vulnerability in an ActiveX control that ships with Norton AntiSpam may permit a remote attacker to execute arbitrary code on the local system.
Symantec Norton AntiSpam for Windows installs the SymSpamHelper Class (symspam.dll), an ActiveX control that is marked safe for scripting. The ActiveX control contains a buffer overflow vulnerability that may be remotely exploited. Using the “LaunchCustomRuleWizard” method an attacker may be able to exploit a buffer overflow in the control to run arbitrary code on the target system.
The victim must open a malicious web page or HTML-formatted email message in order for this vulnerability to be exploited remotely.
An attacker may be able to exploit this vulnerable to execute arbitrary code on the target system with elevated privileges.
According to the Symantec advisory, customers should run Symantec LiveUpdate manually to ensure all installed Symantec products are fully updated.
* Open any installed Symantec product
* Click on LiveUpdate in the toolbar
* Run LiveUpdate until all available Symantec product updates are downloaded and installed
344718
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: March 24, 2004
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.sarc.com/avcenter/security/Content/2004.03.19.html>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23344718 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to NGSSoftware Insight Security Research for reporting this vulnerability.
This document was written by Jason A Rafail and is based on information provided by NGSSoftware Insight Security Research and Symantec.
CVE IDs: | CVE-2004-0363 |
---|---|
Severity Metric: | 15.30 Date Public: |