var-200303-0032
Vulnerability from variot
The client for Symantec Norton AntiVirus Corporate Edition 7.5.x before 7.5.1 Build 62 and 7.6.x before 7.6.1 Build 35a runs winhlp32 with raised privileges, which allows local users to gain privileges by using certain features of winhlp32. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. This issue may occur in applications or services where the Help function is not called in a secure manner. An example of this is when Anti-virus software or a personal firewall is running on the local system with the privileges of an administrator on the local system, and has an interface to "communicate" with the user. ISIHARA Takanori reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A user may gain unauthorized access to resources on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200303-0032", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "corporate_7.6" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "corporate_7.5" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "corporate_7.51" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition prior to 7.5.1 build 62" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition prior to 7.6.1 build 35a" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition 9.0.1 upgrade to mr3 or later" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition 9.0.2 upgrade to mr3 or later" }, { "model": "antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "edition 9.0 upgrade to mr3 or later" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2.0 upgrade to mr3 or later" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2.0.1 upgrade to mr3 or later" }, { "model": "client security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2.0.2 upgrade to mr3 or later" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "CNNVD", "id": "CNNVD-200303-085" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:symantec_client_security", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000026" } ] }, "cve": "CVE-2002-1540", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2002-1540", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2011-000026", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-5925", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-1540", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2011-000026", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200303-085", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-5925", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-5925" }, { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "CNNVD", "id": "CNNVD-200303-085" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The client for Symantec Norton AntiVirus Corporate Edition 7.5.x before 7.5.1 Build 62 and 7.6.x before 7.6.1 Build 35a runs winhlp32 with raised privileges, which allows local users to gain privileges by using certain features of winhlp32. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. Applications or Services that call the Windows Help function in an insecure manner may allow a user unauthorized access to resrouces on the system. This issue may occur in applications or services where the Help function is not called in a secure manner. An example of this is when Anti-virus software or a personal firewall is running on the local system with the privileges of an administrator on the local system, and has an interface to \"communicate\" with the user. ISIHARA Takanori reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A user may gain unauthorized access to resources on the system", "sources": [ { "db": "NVD", "id": "CVE-2002-1540" }, { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "VULHUB", "id": "VHN-5925" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2002-1540", "trust": 2.5 }, { "db": "OSVDB", "id": "6258", "trust": 1.7 }, { "db": "JVN", "id": "JVN63898867", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-000026", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20021025 RE: DH TEAM: NORTON ANTIVIRUS CORPORATE EDITION PRIVILEGE ESCALATION, HTTP://ONLINE.SECURITYFOCUS.COM/ARCHIVE/1/296979/2002-10-22/2002-10-28/0", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20021024 DH TEAM: NORTON ANTIVIRUS CORPORATE EDITION PRIVILEGE ESCALATION", "trust": 0.6 }, { "db": "XF", "id": "32", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200303-085", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-5925", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-5925" }, { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "CNNVD", "id": "CNNVD-200303-085" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "id": "VAR-200303-0032", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5925" } ], "trust": 0.01 }, "last_update_date": "2024-11-22T22:22:01.746000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security, services and the interactive desktop in Windows", "trust": 0.8, "url": "http://support.microsoft.com/kb/327618/en-us" }, { "title": "SYM05-012 ", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2005.08.24.html" }, { "title": "October 15, 2002 Symantec Norton AntiVirus Corporate Edition 7.x Help File Elevation of Privilege", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2002.10.15.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0346.html" }, { "trust": 2.7, "url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0369.html" }, { "trust": 2.7, "url": "http://www.osvdb.org/6258" }, { "trust": 2.7, "url": "http://www.iss.net/security_center/static/10475.php" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1540" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2017" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn63898867" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2002-1540" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2005-2017" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5925" }, { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "CNNVD", "id": "CNNVD-200303-085" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-5925" }, { "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "db": "CNNVD", "id": "CNNVD-200303-085" }, { "db": "NVD", "id": "CVE-2002-1540" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2003-03-31T00:00:00", "db": "VULHUB", "id": "VHN-5925" }, { "date": "2011-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "date": "2003-03-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200303-085" }, { "date": "2003-03-31T05:00:00", "db": "NVD", "id": "CVE-2002-1540" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-09-10T00:00:00", "db": "VULHUB", "id": "VHN-5925" }, { "date": "2011-05-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000026" }, { "date": "2006-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200303-085" }, { "date": "2024-11-20T23:41:32.950000", "db": "NVD", "id": "CVE-2002-1540" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-200303-085" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Applications that use the Windows Help function may be vulnerable to privilege escalation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000026" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "unknown", "sources": [ { "db": "CNNVD", "id": "CNNVD-200303-085" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.