Vulnerability Note VU#682110
Multiple Symantec firewall products fail to properly process DNS response packets
There is a vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) response packet could allow an unauthenticated, remote attacker to cause a denial of service condition.
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NetBIOS Name Service (NBNS) responses. There is a vulnerability in the routine responsible for processing incoming DNS responses. By supplying a DNS packet containing a specially crafted compressed name pointer, an attacker could cause the kernel to enter an infinite loop on the vulnerable system.
According to the Symantec Advisory, the following products are affected:
An unauthenticated, remote attacker could cause a denial of service condition on the vulnerable system. In order to regain functionality, the system may have to be rebooted.
Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Symantec Corporation||Affected||-||13 May 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by eEye Digital Security .
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory .
- CVE IDs: CAN-2004-0445
- Date Public: 12 May 2004
- Date First Published: 13 May 2004
- Date Last Updated: 13 May 2004
- Severity Metric: 9.56
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.