Vulnerability Note VU#637318
Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records
There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS requests and responses. There is a buffer overflow vulnerability in the routine responsible for processing incoming DNS packets. By supplying a specially crafted DNS resource record containing an overly long canonical name (CNAME) value, an attacker could cause a stack overflow allowing arbitrary code execution.
According to the Symantec Advisory, the following products are affected:
Symantec Norton Internet Security and Professional 2002, 2003, 2004
Symantec Norton Personal Firewall 2002, 2003, 2004
Symantec Norton AntiSpam 2004
Symantec Client Firewall 5.01, 5.1.1
Symantec Client Security 1.0, 1.1, 2.0(SCF 7.1)
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Symantec Corporation||Affected||-||13 May 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
- CVE IDs: CAN-2004-0444
- Date Public: 12 May 2004
- Date First Published: 13 May 2004
- Date Last Updated: 13 May 2004
- Severity Metric: 23.91
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.