Lucene search

K
certCERTVU:682110
HistoryMay 13, 2004 - 12:00 a.m.

Multiple Symantec firewall products fail to properly process DNS response packets

2004-05-1300:00:00
www.kb.cert.org
14

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.92 High

EPSS

Percentile

99.0%

Overview

There is a vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) response packet could allow an unauthenticated, remote attacker to cause a denial of service condition.

Description

Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NetBIOS Name Service (NBNS) responses. There is a vulnerability in the routine responsible for processing incoming DNS responses. By supplying a DNS packet containing a specially crafted compressed name pointer, an attacker could cause the kernel to enter an infinite loop on the vulnerable system.

According to the Symantec Advisory, the following products are affected:

Consumer:
Symantec Norton Internet Security and Professional 2002, 2003, 2004
Symantec Norton Personal Firewall 2002, 2003, 2004
Symantec Norton AntiSpam 2004

Corporate:
Symantec Client Firewall 5.01, 5.1.1
Symantec Client Security 1.0, 1.1, 2.0(SCF 7.1)


Impact

An unauthenticated, remote attacker could cause a denial of service condition on the vulnerable system. In order to regain functionality, the system may have to be rebooted.


Solution

Apply Patch

Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.

Use LiveUpdate
Symantec recommends that clients running consumer versions of the affected products use the LiveUpdate feature to ensure all updates are installed. According to Symantec, this can be done as follows:

* `Open any installed Symantec product`
* `Click on LiveUpdate in the toolbar`
* `Run LiveUpdate until Symantec LiveUpdate indicated that all installed Symantec products are up-to-date`
* `Depending on the application, system may require a reboot to effectively update available fixes`  

Vendor Information

682110

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Symantec Corporation __ Affected

Updated: May 13, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please refer to Symantec Security Advisory SYM04-008.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23682110 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by eEye Digital Security.

This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.

Other Information

CVE IDs: CVE-2004-0445
Severity Metric: 9.56 Date Public:

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:N/A:P

0.92 High

EPSS

Percentile

99.0%

Related for VU:682110