var-200505-0454
Vulnerability from variot

Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type. It is reported that the issue manifests when an unspecified type of file is scanned by AutoProtect, the scan results in the device driver module failing leading to a subsequent kernel crash. The Symantec Norton AntiVirus AutoProtect SmartScan functionality is reported prone to a local denial of service vulnerability. A local attacker may exploit this vulnerability to deny service for legitimate users. This type of file itself is not malicious, but an attacker may maliciously introduce the file from the outside through email or http, and an authorized user may also introduce the file from the inside to interrupt the service of the target system.

PROVIDED AND/OR DISCOVERED BY: Isamu Noguchi

ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0454",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 3.0,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 3.0,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": "norton system works",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2005_premier"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2.1"
      },
      {
        "model": "norton system works",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "2004_professional"
      },
      {
        "model": "norton antivirus",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton internet security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "2004 (professional)"
      },
      {
        "model": "norton systemworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "2004 (professional)"
      },
      {
        "model": "norton systemworks",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "2005 (premier)"
      },
      {
        "model": "norton system works premier",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "symantec",
        "version": "2005"
      },
      {
        "model": "norton systemworks professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "2004"
      },
      {
        "model": "norton internet security professional edition",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "2004"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:symantec:norton_antivirus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:norton_internet_security",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:norton_system_works",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Isamu Noguchi",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0922",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2005-0922",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2005-000762",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-12131",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-0922",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#146020",
            "trust": 0.8,
            "value": "4.50"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#713620",
            "trust": 0.8,
            "value": "4.05"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2005-000762",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-099",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-12131",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown vulnerability in the Auto-Protect module in Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (system hang or crash) by triggering a scan of a certain file type. It is reported that the issue manifests when an unspecified type of file is scanned by AutoProtect, the scan results in the device driver module failing leading to a subsequent kernel crash. The Symantec Norton AntiVirus AutoProtect SmartScan functionality is reported prone to a local denial of service vulnerability. \nA local attacker may exploit this vulnerability to deny service for legitimate users. This type of file itself is not malicious, but an attacker may maliciously introduce the file from the outside through email or http, and an authorized user may also introduce the file from the inside to interrupt the service of the target system. \n\nPROVIDED AND/OR DISCOVERED BY:\nIsamu Noguchi\n\nORIGINAL ADVISORY:\nSymantec:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      },
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "db": "PACKETSTORM",
        "id": "36864"
      }
    ],
    "trust": 3.78
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "14741",
        "trust": 4.2
      },
      {
        "db": "BID",
        "id": "12923",
        "trust": 3.6
      },
      {
        "db": "SECTRACK",
        "id": "1013587",
        "trust": 3.3
      },
      {
        "db": "CERT/CC",
        "id": "VU#146020",
        "trust": 3.3
      },
      {
        "db": "SECTRACK",
        "id": "1013586",
        "trust": 3.3
      },
      {
        "db": "SECTRACK",
        "id": "1013585",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "12924",
        "trust": 1.1
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "36864",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "PACKETSTORM",
        "id": "36864"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "id": "VAR-200505-0454",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:58:02.821000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SYM05-006",
        "trust": 0.8,
        "url": "http://www.symantec.com/avcenter/security/Content/2005.03.28.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "http://securityresponse.symantec.com/avcenter/security/content/2005.03.28.html"
      },
      {
        "trust": 3.3,
        "url": "http://www.securityfocus.com/bid/12923"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/146020"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1013585"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1013586"
      },
      {
        "trust": 2.5,
        "url": "http://securitytracker.com/id?1013587"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/14741"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/14741/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2005/mar/1013587"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/bid/12924"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2005/mar/1013586"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0922"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvnc45d8ead/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0922"
      },
      {
        "trust": 0.6,
        "url": "http://www.symantec.com/avcenter/security/content/2005.03.28.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4009/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4848/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2800/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2796/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2442/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4847/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "PACKETSTORM",
        "id": "36864"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "db": "PACKETSTORM",
        "id": "36864"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "date": "2005-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "date": "2005-05-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "date": "2005-03-28T00:00:00",
        "db": "BID",
        "id": "12923"
      },
      {
        "date": "2005-03-28T00:00:00",
        "db": "BID",
        "id": "12924"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "date": "2005-03-30T08:17:27",
        "db": "PACKETSTORM",
        "id": "36864"
      },
      {
        "date": "2005-03-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#146020"
      },
      {
        "date": "2005-03-30T00:00:00",
        "db": "CERT/CC",
        "id": "VU#713620"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-12131"
      },
      {
        "date": "2005-03-28T00:00:00",
        "db": "BID",
        "id": "12923"
      },
      {
        "date": "2005-03-28T00:00:00",
        "db": "BID",
        "id": "12924"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000762"
      },
      {
        "date": "2006-09-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      },
      {
        "date": "2024-11-20T23:56:11.477000",
        "db": "NVD",
        "id": "CVE-2005-0922"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Symantec Norton AntiVirus AutoProtect Module Remote Denial Of Service Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-099"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "12923"
      },
      {
        "db": "BID",
        "id": "12924"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.