Vulnerability Note VU#344718

Norton AntiSpam contains boundary error within the "SymSpamHelper Class" (symspam.dll) ActiveX component.

Original Release date: 25 Mar 2004 | Last revised: 25 Mar 2004


Symantec's Norton AntiSpam is a software package that provides spam filtering. A vulnerability in an ActiveX control that ships with Norton AntiSpam may permit a remote attacker to execute arbitrary code on the local system.


Symantec Norton AntiSpam for Windows installs the SymSpamHelper Class (symspam.dll), an ActiveX control that is marked safe for scripting. The ActiveX control contains a buffer overflow vulnerability that may be remotely exploited. Using the "LaunchCustomRuleWizard" method an attacker may be able to exploit a buffer overflow in the control to run arbitrary code on the target system.

The victim must open a malicious web page or HTML-formatted email message in order for this vulnerability to be exploited remotely.


An attacker may be able to exploit this vulnerable to execute arbitrary code on the target system with elevated privileges.


According to the Symantec advisory, customers should run Symantec LiveUpdate manually to ensure all installed Symantec products are fully updated.

  • Open any installed Symantec product
  • Click on LiveUpdate in the toolbar
  • Run LiveUpdate until all available Symantec product updates are downloaded and installed

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Symantec CorporationAffected-24 Mar 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to NGSSoftware Insight Security Research for reporting this vulnerability.

This document was written by Jason A Rafail and is based on information provided by NGSSoftware Insight Security Research and Symantec.

Other Information

  • CVE IDs: CAN-2004-0363
  • Date Public: 19 Mar 2004
  • Date First Published: 25 Mar 2004
  • Date Last Updated: 25 Mar 2004
  • Severity Metric: 15.30
  • Document Revision: 4


If you have feedback, comments, or additional information about this vulnerability, please send us email.