Norton "WrapNISUM Class" (WrapUM.dll) ActiveX control allows remote arbitrary command execution

ID VU:549054
Type cert
Reporter CERT
Modified 2004-03-25T19:51:00



Symantec's Norton Internet Security 2004 Professional is a software package that provides antivirus, antispam, and personal firewall applications. A vulnerability in an Symantec's Norton Internet Security 2004 suite may permit a remote attacker to execute arbitrary commands on the local system.


Symantec Norton Internet Security 2004 and Professional for Windows installs the WrapNISUM Class (WrapUM.dll), an ActiveX control that is marked safe for scripting. The ActiveX control fails to properly parse and validate input from external sources. Using the "LaunchURL" method an attacker has the ability to force the browser to run arbitrary executables on the target system.

The victim must open a malicious web page or HTML-formatted email message in order for this vulnerability to be exploited remotely.


An attacker may be able to exploit this vulnerable to execute arbitrary commands on the target system.


According to the Symantec advisory, customers should run Symantec LiveUpdate manually to ensure all installed Symantec products are fully updated.

* Open any installed Symantec product 
* Click on LiveUpdate in the toolbar 
* Run LiveUpdate until all available Symantec product updates are downloaded and installed

Vendor Information


Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Symantec Corporation __ Affected

Updated: March 24, 2004



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please see <>

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
Base | |
Temporal | |
Environmental | |


  • <>
  • <>
  • <>


Thanks to NGSSoftware Insight Security Research for reporting this vulnerability.

This document was written by Jason A Rafail and is based on information provided by NGSSoftware Insight Security Research and Symantec.

Other Information

CVE IDs: | CVE-2004-0364
Severity Metric: | 12.43
Date Public: | 2004-03-19
Date First Published: | 2004-03-25
Date Last Updated: | 2004-03-25 19:51 UTC
Document Revision: | 8