There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS responses. There is a buffer overflow vulnerability in the routines responsible for processing incoming NBNS responses. By supplying a specially crafted NBNS packet, an attacker could cause a stack overflow allowing arbitrary locations in memory to be overwritten.
According to the Symantec Advisory, the following products are affected:
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system. According to the eEye Digital Security Advisory, in order for this vulnerability to be exploited, the firewall must be configured to allow incoming 137/udp packets. This configuration is not present by default.
Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
|Date First Published:||2004-05-13|
|Date Last Updated:||2004-06-02 17:57 UTC|