Overview
There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Description
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NBNS requests and responses. There is a buffer overflow vulnerability in the routine responsible for processing incoming DNS packets. By supplying a specially crafted DNS resource record containing an overly long canonical name (CNAME) value, an attacker could cause a stack overflow allowing arbitrary code execution. According to the Symantec Advisory, the following products are affected: |
Impact
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system. |
Solution
Apply Patch Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
Other Information
CVE IDs: | CVE-2004-0444 |
Severity Metric: | 23.91 |
Date Public: | 2004-05-12 |
Date First Published: | 2004-05-13 |
Date Last Updated: | 2004-05-13 20:06 UTC |
Document Revision: | 11 |