var-200407-0080
Vulnerability from variot

Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges. client firewall , client security , norton antispam An unspecified vulnerability exists in multiple Symantec products, including:None. The issue is due to insufficient bounds checking of DNS response data and may be exploited to gain SYSTEM/kernel level access to a computer hosting the vulnerable software. The source of the vulnerability is that the CNAME (Canonical Name) data field specified in incoming DNS Resource Records is copied into an internal buffer in an insecure manner, resulting in a stack-based buffer overflow. As a result, an attacker on a local network could respond to a NetBIOS Name Service query from a client and send a malformed response in return that overflows a vulnerable buffer. A successful attack could allow an attacker to gain SYSTEM level privileges on a vulnerable system. Products driven by SYMDNS.SYS have problems responding to the NetBIOS name service when reading the response data from the packet. After copying these data, the structure of the heap in memory is destroyed. An attacker can construct malicious data and send it to UDP affected by this vulnerability. 137 port, denial of service attacks can occur. It is possible to execute arbitrary commands

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200407-0080",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": null,
        "trust": 3.2,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "symantec",
        "version": "1.1"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "symantec",
        "version": "1.0"
      },
      {
        "model": "client firewall",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "symantec",
        "version": "5.1.1"
      },
      {
        "model": "client firewall",
        "scope": "eq",
        "trust": 2.5,
        "vendor": "symantec",
        "version": "5.01"
      },
      {
        "model": "norton personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2003"
      },
      {
        "model": "norton personal firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2002"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2003"
      },
      {
        "model": "norton antispam",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.2"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.5"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.4"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.3"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.6"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "1.7"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "1.9"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "1.8"
      },
      {
        "model": "client security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "2.0"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "2002"
      },
      {
        "model": "norton internet security professional edition",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton internet security professional edition",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "symantec",
        "version": "2003"
      },
      {
        "model": "norton internet security professional edition",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "symantec",
        "version": "20020"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "symantec",
        "version": "20020"
      },
      {
        "model": "client security (scf",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "symantec",
        "version": "2.07.1)"
      },
      {
        "model": "client security",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "norton antispam",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "norton internet security",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "client firewall",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
        "version": null
      },
      {
        "model": "norton personal firewall",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b7\u30de\u30f3\u30c6\u30c3\u30af",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eeye Digital Security",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0444",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0444",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-8874",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0444",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#637318",
            "trust": 0.8,
            "value": "23.91"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#294998",
            "trust": 0.8,
            "value": "15.54"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#682110",
            "trust": 0.8,
            "value": "9.56"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#634414",
            "trust": 0.8,
            "value": "21.09"
          },
          {
            "author": "NVD",
            "id": "CVE-2004-0444",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200407-017",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-8874",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components. There is a heap corruption vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges. client firewall , client security , norton antispam An unspecified vulnerability exists in multiple Symantec products, including:None. \nThe issue is due to insufficient bounds checking of DNS response data and may be exploited to gain SYSTEM/kernel level access to a computer hosting the vulnerable software. \nThe source of the vulnerability is that the CNAME (Canonical Name) data field specified in incoming DNS Resource Records is copied into an internal buffer in an insecure manner, resulting in a stack-based buffer overflow.  As a result, an attacker on a local network could respond to a NetBIOS Name Service query from a client and send a malformed response in return that overflows a vulnerable buffer. \nA successful attack could allow an attacker to gain SYSTEM level privileges on a vulnerable system. Products driven by SYMDNS.SYS have problems responding to the NetBIOS name service when reading the response data from the packet. After copying these data, the structure of the heap in memory is destroyed. An attacker can construct malicious data and send it to UDP affected by this vulnerability. 137 port, denial of service attacks can occur. It is possible to execute arbitrary commands",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      },
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      }
    ],
    "trust": 5.4
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "11066",
        "trust": 5.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998",
        "trust": 3.9
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444",
        "trust": 3.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#637318",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "10334",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "10335",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "10333",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1010144",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1010146",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1010145",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "6101",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "6099",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "6102",
        "trust": 1.7
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017",
        "trust": 0.7
      },
      {
        "db": "FULLDISC",
        "id": "20040512 EEYE: SYMANTEC MULTIPLE FIREWALL NBNS RESPONSE REMOTE HEAP CORRUPTION",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20040512 EEYE: SYMANTEC MULTIPLE FIREWALL REMOTE DNS KERNEL OVERFLOW",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20040512 EEYE: SYMANTEC MULTIPLE FIREWALL NBNS RESPONSE PROCESSING STACK OVERFLOW",
        "trust": 0.6
      },
      {
        "db": "CIAC",
        "id": "O-141",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16137",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16135",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16134",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "id": "VAR-200407-0080",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T15:04:47.720000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "others (CWE-Other) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 5.8,
        "url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html"
      },
      {
        "trust": 3.2,
        "url": "http://secunia.com/advisories/11066/"
      },
      {
        "trust": 3.1,
        "url": "http://www.kb.cert.org/vuls/id/294998"
      },
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/634414"
      },
      {
        "trust": 2.8,
        "url": "http://www.kb.cert.org/vuls/id/637318"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/10333"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/10334"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/10335"
      },
      {
        "trust": 2.5,
        "url": "http://www.ciac.org/ciac/bulletins/o-141.shtml"
      },
      {
        "trust": 2.5,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-may/021360.html"
      },
      {
        "trust": 2.5,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-may/021362.html"
      },
      {
        "trust": 2.5,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-may/021361.html"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1010144"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1010145"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1010146"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/11066"
      },
      {
        "trust": 1.9,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16137"
      },
      {
        "trust": 1.9,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16135"
      },
      {
        "trust": 1.9,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16134"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6099"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6101"
      },
      {
        "trust": 1.7,
        "url": "http://www.osvdb.org/6102"
      },
      {
        "trust": 1.1,
        "url": "http://www.eeye.com/html/research/advisories/ad20040512d.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.eeye.com/html/research/advisories/ad20040512c.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.eeye.com/html/research/advisories/ad20040512a.html"
      },
      {
        "trust": 0.9,
        "url": "/archive/1/363228"
      },
      {
        "trust": 0.8,
        "url": "http://www.eeye.com/html/research/advisories/ad20040512b.html"
      },
      {
        "trust": 0.8,
        "url": "http://securityresponse.symantec.com/avcenter/security/content/2004.05.12.html "
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc1001.txt"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0444"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16137"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16135"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16134"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "date": "2004-07-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "date": "2004-05-12T00:00:00",
        "db": "BID",
        "id": "10335"
      },
      {
        "date": "2004-05-12T00:00:00",
        "db": "BID",
        "id": "10334"
      },
      {
        "date": "2004-05-12T00:00:00",
        "db": "BID",
        "id": "10333"
      },
      {
        "date": "2024-06-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "date": "2004-05-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "date": "2004-07-07T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#637318"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#294998"
      },
      {
        "date": "2004-05-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#682110"
      },
      {
        "date": "2004-06-02T00:00:00",
        "db": "CERT/CC",
        "id": "VU#634414"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8874"
      },
      {
        "date": "2009-07-12T04:07:00",
        "db": "BID",
        "id": "10335"
      },
      {
        "date": "2009-07-12T04:07:00",
        "db": "BID",
        "id": "10334"
      },
      {
        "date": "2004-05-12T00:00:00",
        "db": "BID",
        "id": "10333"
      },
      {
        "date": "2024-06-04T08:51:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000890"
      },
      {
        "date": "2006-08-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      },
      {
        "date": "2017-07-11T01:30:09.870000",
        "db": "NVD",
        "id": "CVE-2004-0444"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple Symantec firewall products contain a buffer overflow in the processing of DNS resource records",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#637318"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "10335"
      },
      {
        "db": "BID",
        "id": "10334"
      },
      {
        "db": "BID",
        "id": "10333"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200407-017"
      }
    ],
    "trust": 1.5
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.