Overview
There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Description
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS responses. There is a buffer overflow vulnerability in the routines responsible for processing incoming NBNS responses. By supplying a specially crafted NBNS packet, an attacker could cause a stack overflow allowing arbitrary locations in memory to be overwritten. According to the Symantec Advisory, the following products are affected: |
Impact
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system. According to the eEye Digital Security Advisory, in order for this vulnerability to be exploited, the firewall must be configured to allow incoming 137/udp packets. This configuration is not present by default. |
Solution
Apply Patch Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
|
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
Other Information
| CVE IDs: | CVE-2004-0444 |
| Severity Metric: | 21.09 |
| Date Public: | 2004-05-12 |
| Date First Published: | 2004-05-13 |
| Date Last Updated: | 2004-06-02 17:57 UTC |
| Document Revision: | 25 |