var-200505-0455
Vulnerability from variot
The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share. Symantec Norton AntiVirus may hang or crash when the Auto-Protect module scans certain files. It is reported that the issue manifests when an unspecified type of file is scanned by AutoProtect, the scan results in the device driver module failing leading to a subsequent kernel crash. The Symantec Norton AntiVirus AutoProtect SmartScan functionality is reported prone to a local denial of service vulnerability. A local attacker may exploit this vulnerability to deny service for legitimate users.
PROVIDED AND/OR DISCOVERED BY: Isamu Noguchi
ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton internet security", "scope": "eq", "trust": 3.0, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 3.0, "vendor": "symantec", "version": "2005" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "symantec", "version": null }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2005_premier" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2.1" }, { "model": "norton system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2004_professional" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2005 (premier)" }, { "model": "norton system works premier", "scope": "eq", "trust": 0.6, "vendor": "symantec", "version": "2005" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" } ], "sources": [ { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "CNNVD", "id": "CNNVD-200505-237" }, { "db": "NVD", "id": "CVE-2005-0923" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_system_works", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000761" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery of this vulnerability is credited to IPA.", "sources": [ { "db": "BID", "id": "12924" }, { "db": "CNNVD", "id": "CNNVD-200505-237" } ], "trust": 0.9 }, "cve": "CVE-2005-0923", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2005-0923", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "IPA", "availabilityImpact": "Complete", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2005-000761", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-12132", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2005-0923", "trust": 1.0, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#146020", "trust": 0.8, "value": "4.50" }, { "author": "CARNEGIE MELLON", "id": "VU#713620", "trust": 0.8, "value": "4.05" }, { "author": "IPA", "id": "JVNDB-2005-000761", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200505-237", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-12132", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "VULHUB", "id": "VHN-12132" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "CNNVD", "id": "CNNVD-200505-237" }, { "db": "NVD", "id": "CVE-2005-0923" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SmartScan feature in the Auto-Protect module for Symantec Norton AntiVirus 2004 and 2005, as also used in Internet Security 2004/2005 and System Works 2004/2005, allows attackers to cause a denial of service (CPU consumption and system crash) by renaming a file on a network share. Symantec Norton AntiVirus may hang or crash when the Auto-Protect module scans certain files. It is reported that the issue manifests when an unspecified type of file is scanned by AutoProtect, the scan results in the device driver module failing leading to a subsequent kernel crash. The Symantec Norton AntiVirus AutoProtect SmartScan functionality is reported prone to a local denial of service vulnerability. \nA local attacker may exploit this vulnerability to deny service for legitimate users. \n\nPROVIDED AND/OR DISCOVERED BY:\nIsamu Noguchi\n\nORIGINAL ADVISORY:\nSymantec:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2005.03.28.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0923" }, { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" }, { "db": "VULHUB", "id": "VHN-12132" }, { "db": "PACKETSTORM", "id": "36864" } ], "trust": 3.78 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "14741", "trust": 4.2 }, { "db": "BID", "id": "12924", "trust": 3.6 }, { "db": "SECTRACK", "id": "1013587", "trust": 3.3 }, { "db": "SECTRACK", "id": "1013586", "trust": 3.3 }, { "db": "CERT/CC", "id": "VU#713620", "trust": 2.5 }, { "db": "SECTRACK", "id": "1013585", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2005-0923", "trust": 2.5 }, { "db": "BID", "id": "12923", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#146020", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000761", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200505-237", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-12132", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "36864", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "VULHUB", "id": "VHN-12132" }, { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "PACKETSTORM", "id": "36864" }, { "db": "CNNVD", "id": "CNNVD-200505-237" }, { "db": "NVD", "id": "CVE-2005-0923" } ] }, "id": "VAR-200505-0455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-12132" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:58:02.773000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM05-006", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2005.03.28.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000761" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0923" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "http://securityresponse.symantec.com/avcenter/security/content/2005.03.28.html" }, { "trust": 3.3, "url": "http://www.securityfocus.com/bid/12924" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1013585" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1013586" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1013587" }, { "trust": 2.5, "url": "http://secunia.com/advisories/14741" }, { "trust": 1.7, "url": "http://secunia.com/advisories/14741/" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/713620" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/12923" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/mar/1013587" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/mar/1013586" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0923" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn23d7e89f/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0923" }, { "trust": 0.6, "url": "http://www.symantec.com/avcenter/security/content/2005.03.28.html" }, { "trust": 0.1, "url": "http://secunia.com/product/4009/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/4848/" }, { "trust": 0.1, "url": "http://secunia.com/product/2800/" }, { "trust": 0.1, "url": "http://secunia.com/product/2796/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2442/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/4847/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "VULHUB", "id": "VHN-12132" }, { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "PACKETSTORM", "id": "36864" }, { "db": "CNNVD", "id": "CNNVD-200505-237" }, { "db": "NVD", "id": "CVE-2005-0923" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#146020" }, { "db": "CERT/CC", "id": "VU#713620" }, { "db": "VULHUB", "id": "VHN-12132" }, { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" }, { "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "db": "PACKETSTORM", "id": "36864" }, { "db": "CNNVD", "id": "CNNVD-200505-237" }, { "db": "NVD", "id": "CVE-2005-0923" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-03-30T00:00:00", "db": "CERT/CC", "id": "VU#146020" }, { "date": "2005-03-30T00:00:00", "db": "CERT/CC", "id": "VU#713620" }, { "date": "2005-05-02T00:00:00", "db": "VULHUB", "id": "VHN-12132" }, { "date": "2005-03-28T00:00:00", "db": "BID", "id": "12923" }, { "date": "2005-03-28T00:00:00", "db": "BID", "id": "12924" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "date": "2005-03-30T08:17:27", "db": "PACKETSTORM", "id": "36864" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-237" }, { "date": "2005-05-02T04:00:00", "db": "NVD", "id": "CVE-2005-0923" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-03-30T00:00:00", "db": "CERT/CC", "id": "VU#146020" }, { "date": "2005-03-30T00:00:00", "db": "CERT/CC", "id": "VU#713620" }, { "date": "2008-09-05T00:00:00", "db": "VULHUB", "id": "VHN-12132" }, { "date": "2005-03-28T00:00:00", "db": "BID", "id": "12923" }, { "date": "2005-03-28T00:00:00", "db": "BID", "id": "12924" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000761" }, { "date": "2006-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200505-237" }, { "date": "2024-11-20T23:56:11.610000", "db": "NVD", "id": "CVE-2005-0923" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton AntiVirus AutoProtect Module SmartScan Local Denial Of Service Vulnerability", "sources": [ { "db": "BID", "id": "12924" }, { "db": "CNNVD", "id": "CNNVD-200505-237" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "12923" }, { "db": "BID", "id": "12924" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.