Overview
There is a vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted Domain Name Service (DNS) response packet could allow an unauthenticated, remote attacker to cause a denial of service condition.
Description
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS driver, which is responsible for validating DNS and NetBIOS Name Service (NBNS) responses. There is a vulnerability in the routine responsible for processing incoming DNS responses. By supplying a DNS packet containing a specially crafted compressed name pointer, an attacker could cause the kernel to enter an infinite loop on the vulnerable system. According to the Symantec Advisory, the following products are affected: |
Impact
An unauthenticated, remote attacker could cause a denial of service condition on the vulnerable system. In order to regain functionality, the system may have to be rebooted. |
Solution
Apply Patch Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
|
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
Other Information
| CVE IDs: | CVE-2004-0445 |
| Severity Metric: | 9.56 |
| Date Public: | 2004-05-12 |
| Date First Published: | 2004-05-13 |
| Date Last Updated: | 2004-05-13 17:27 UTC |
| Document Revision: | 9 |