Overview
There is a vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) response packet could allow an unauthenticated, remote attacker to cause a denial of service condition.
Description
| Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NetBIOS Name Service (NBNS) responses. There is a vulnerability in the routine responsible for processing incoming DNS responses. By supplying a DNS packet containing a specially crafted compressed name pointer, an attacker could cause the kernel to enter an infinite loop on the vulnerable system. According to the Symantec Advisory, the following products are affected: | 
Impact
| An unauthenticated, remote attacker could cause a denial of service condition on the vulnerable system. In order to regain functionality, the system may have to be rebooted. | 
Solution
| Apply Patch Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels. 
 | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
Other Information
| CVE IDs: | CVE-2004-0445 | 
| Severity Metric: | 9.56 | 
| Date Public: | 2004-05-12 | 
| Date First Published: | 2004-05-13 | 
| Date Last Updated: | 2004-05-13 17:27 UTC | 
| Document Revision: | 9 |