Norton "WrapNISUM Class" (WrapUM.dll) ActiveX control allows remote arbitrary command execution

2004-03-25T00:00:00
ID VU:549054
Type cert
Reporter CERT
Modified 2004-03-25T19:51:00

Description

Overview

Symantec's Norton Internet Security 2004 Professional is a software package that provides antivirus, antispam, and personal firewall applications. A vulnerability in an Symantec's Norton Internet Security 2004 suite may permit a remote attacker to execute arbitrary commands on the local system.

Description

Symantec Norton Internet Security 2004 and Professional for Windows installs the WrapNISUM Class (WrapUM.dll), an ActiveX control that is marked safe for scripting. The ActiveX control fails to properly parse and validate input from external sources. Using the "LaunchURL" method an attacker has the ability to force the browser to run arbitrary executables on the target system.

The victim must open a malicious web page or HTML-formatted email message in order for this vulnerability to be exploited remotely.


Impact

An attacker may be able to exploit this vulnerable to execute arbitrary commands on the target system.


Solution

According to the Symantec advisory, customers should run Symantec LiveUpdate manually to ensure all installed Symantec products are fully updated.

* Open any installed Symantec product 
* Click on LiveUpdate in the toolbar 
* Run LiveUpdate until all available Symantec product updates are downloaded and installed

Vendor Information

549054

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Affected Unknown __ Unaffected

Javascript is disabled. Click here to view vendors.

__ Symantec Corporation

Updated: March 24, 2004

Status

__ Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see <http://www.sarc.com/avcenter/security/Content/2004.03.19.html>

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A

References

  • <http://www.sarc.com/avcenter/security/Content/2004.03.19.html>
  • <http://www.ngssoftware.com/advisories/nisrce.txt>
  • <http://secunia.com/advisories/11168/>

Credit

Thanks to NGSSoftware Insight Security Research for reporting this vulnerability.

This document was written by Jason A Rafail and is based on information provided by NGSSoftware Insight Security Research and Symantec.

Other Information

CVE IDs: | CVE-2004-0364
---|---
Severity Metric:** | 12.43
Date Public:
| 2004-03-19
Date First Published: | 2004-03-25
Date Last Updated: | 2004-03-25 19:51 UTC
Document Revision: | 7