Overview
There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Description
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS requests and responses. There is a buffer overflow vulnerability in the routine responsible for processing incoming DNS packets. By supplying a specially crafted DNS resource record containing an overly long canonical name (CNAME) value, an attacker could cause a stack overflow allowing arbitrary code execution. According to the Symantec Advisory, the following products are affected: |
Impact
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system. |
Solution
Apply Patch Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
|
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
Other Information
| CVE IDs: | CVE-2004-0444 |
| Severity Metric: | 23.91 |
| Date Public: | 2004-05-12 |
| Date First Published: | 2004-05-13 |
| Date Last Updated: | 2004-05-13 20:06 UTC |
| Document Revision: | 11 |