var-200703-0615
Vulnerability from variot
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855. Symantec 'SYMTDI.SYS' device driver is prone to a local denial-of-service vulnerability. A local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. This issue is similar to the one described in BID 22961. Symantec is currently investigating this issue; we will update this BID as more information emerges. Norton Personal Firewall does not adequately protect its \Device\SymEvent driver and does not validate input buffers, so a local attacker can open the driver and send arbitrary data that is considered valid. A specially crafted IRP sent to an IOCTL handler function could allow memory to be overwritten because the address space was not properly validated in some versions of the driver. A potential attacker must be logged into the computer to attempt an exploit. A successful exploit of this vulnerability could potentially allow that user to crash their computer.
Symantec Response Symantec engineers have verified that the vulnerability exists in the products listed in the Affected Products section above, and have provided updates for all affected products. Consumer (Norton) products can be updated by running LiveUpdate. Symantec AntiVirus Corporate Edition customers can obtain the update from the Symantec web site.
Symantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue.
References This issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-1476 to this issue. SecurityFocus has assigned BID 22977 to this vulnerability.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Symantec Product Security
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.6 (Build 6060)
iQEVAwUBRuVg1/9Lqygkbb6BAQiy8gf/aQDO+uftL8+Ia+FLbnOuuEUzfR/LWBHn SFSBw8hk38Gq4DAGMYeBI2Am74cUxjWQ5e3NqG4sQgHD2bfjTkrcPdMabiL8JaM9 j8TaCNBxgyClAcfI79dFinbgBTg4tNMfLbcLeg31gKV64WhQ962cfiZhbURXseS9 gdQMhVEDyyalFvpFFhtWkY+XigLMFeEMeMdjC77nw4jedwgQBS0FV4IAnGn8diHN 2yEHef2I4/pUj8JxHSV2DY5FudWaAc3TbdesBi5jVA/aXg2DOwHGrq05QRG1/qbp /45TREnS+hw0w3xyGs1JbZH0vlqiWoWjwKkv+xrL46bJ7laCTVON3Q== =Cd3j -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.394" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.400" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.396" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2020" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2011" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2021" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.401" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.1.0.396" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.1.0.401" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1008" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.0.359" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1001" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2.0.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2000" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1000" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2010" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2001" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1007" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2002" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.401" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.2" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.3_build_9.0.3.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.1" }, { "model": "norton system works", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "norton antispam", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.5" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1.1000" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006_9.1.0.33" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.5_build_1100" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.396" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.6.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_scf_7.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.4" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.4.4010" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0_stm_build_9.0.0.338" }, { "model": "norton system works", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "norton personal firewall", "scope": "lte", "trust": 1.0, "vendor": "symantec", "version": "2006_9.1.1.7" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.2" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.1.1009" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.1_build_9.0.1.1000" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.2_build_9.0.2.1000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.6" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1.1008" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.394" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1.400" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1.1007" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.5" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.5_build_1100_mp1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2.0.3" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "client security", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton antispam", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "corporate edition 3.0.x to 10.1.x" }, { "model": "norton internet security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2005 and 2006" }, { "model": "norton personal firewall", "scope": "lte", "trust": 0.8, "vendor": "symantec", "version": "2006 9.1.1.7" }, { "model": "norton systemworks", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.6.6000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.41000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.6.1000" }, { "model": "client security mr6", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.6" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1007" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.1.7" }, { "model": "antivirus corporate edition mr6 mp1", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "9" }, { "model": "antivirus corporate edition mr6 mp1", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.394" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.600" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.6000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.400" }, { "model": "client security mr6", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.401" }, { "model": "client security mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.4-4010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.396" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4.4010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1000" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5" }, { "model": "antivirus corporate edition mr6", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.33" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1008" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.51100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "client security mr6 mp1", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "norton antispam", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.0.359" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "client security mr6 mp1", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "2.0" }, { "model": "antivirus corporate edition mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4-4010" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.41000" } ], "sources": [ { "db": "BID", "id": "22977" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "CNNVD", "id": "CNNVD-200703-393" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antispam", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_system_works", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005251" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Matousek\u203b david@matousec.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-393" } ], "trust": 0.6 }, "cve": "CVE-2007-1476", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "CVE-2007-1476", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-24838", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-1476", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2007-1476", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-200703-393", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-24838", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-24838" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "CNNVD", "id": "CNNVD-200703-393" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver\u0027s \\Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855. Symantec \u0027SYMTDI.SYS\u0027 device driver is prone to a local denial-of-service vulnerability. \nA local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. \nThis issue is similar to the one described in BID 22961. Symantec is currently investigating this issue; we will update this BID as more information emerges. Norton Personal Firewall does not adequately protect its \\Device\\SymEvent driver and does not validate input buffers, so a local attacker can open the driver and send arbitrary data that is considered valid. A specially crafted IRP sent to an IOCTL handler function could allow memory to be overwritten because the address space was not properly validated in some versions of the driver. A potential attacker must be logged into the computer to attempt an exploit. A successful exploit of this vulnerability could potentially allow that user to crash their computer. \n\nSymantec Response\nSymantec engineers have verified that the vulnerability exists in the products listed in the Affected Products section above, and have provided updates for all affected products. Consumer (Norton) products can be updated by running LiveUpdate. Symantec AntiVirus Corporate Edition customers can obtain the update from the Symantec web site. \n\nSymantec is not aware of any customers impacted by this issue, or of any attempts to exploit the issue. \n\nReferences\nThis issue is a candidate for inclusion in the Common Vulnerabilities and Exposures (CVE) list (http://cve.mitre.org), which standardizes names for security problems. The CVE initiative has assigned CVE-2007-1476 to this issue. \nSecurityFocus has assigned BID 22977 to this vulnerability. \n\n\n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nSymantec Product Security\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.0.6 (Build 6060)\n\niQEVAwUBRuVg1/9Lqygkbb6BAQiy8gf/aQDO+uftL8+Ia+FLbnOuuEUzfR/LWBHn\nSFSBw8hk38Gq4DAGMYeBI2Am74cUxjWQ5e3NqG4sQgHD2bfjTkrcPdMabiL8JaM9\nj8TaCNBxgyClAcfI79dFinbgBTg4tNMfLbcLeg31gKV64WhQ962cfiZhbURXseS9\ngdQMhVEDyyalFvpFFhtWkY+XigLMFeEMeMdjC77nw4jedwgQBS0FV4IAnGn8diHN\n2yEHef2I4/pUj8JxHSV2DY5FudWaAc3TbdesBi5jVA/aXg2DOwHGrq05QRG1/qbp\n/45TREnS+hw0w3xyGs1JbZH0vlqiWoWjwKkv+xrL46bJ7laCTVON3Q==\n=Cd3j\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2007-1476" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "BID", "id": "22977" }, { "db": "VULHUB", "id": "VHN-24838" }, { "db": "PACKETSTORM", "id": "59201" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-24838", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-24838" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1476", "trust": 2.9 }, { "db": "BID", "id": "22977", "trust": 2.0 }, { "db": "SREASON", "id": "2438", "trust": 1.7 }, { "db": "SECTRACK", "id": "1018656", "trust": 1.7 }, { "db": "OSVDB", "id": "35088", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-005251", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200703-393", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20070315 NORTON INSUFFICIENT VALIDATION OF \u0027SYMTDI\u0027 DRIVER INPUT BUFFER", "trust": 0.6 }, { "db": "XF", "id": "33003", "trust": 0.6 }, { "db": "FULLDISC", "id": "20070315 NORTON INSUFFICIENT VALIDATION OF \u0027SYMTDI\u0027 DRIVER", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "59201", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-83226", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29743", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-24838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24838" }, { "db": "BID", "id": "22977" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "PACKETSTORM", "id": "59201" }, { "db": "CNNVD", "id": "CNNVD-200703-393" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "id": "VAR-200703-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24838" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:46:54.278000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM07-024", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2007.09.05.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005251" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24838" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22977" }, { "trust": 1.7, "url": "http://www.symantec.com/avcenter/security/content/2007.09.05.html" }, { "trust": 1.7, "url": "http://www.matousec.com/info/advisories/norton-insufficient-validation-of-symtdi-driver-input-buffer.php" }, { "trust": 1.7, "url": "http://osvdb.org/35088" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1018656" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/2438" }, { "trust": 1.6, "url": "http://marc.info/?l=full-disclosure\u0026m=117396596027148\u0026w=2" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/462926/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33003" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1476" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1476" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/33003" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/462926/100/0/threaded" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.3, "url": "/archive/1/462926" }, { "trust": 0.3, "url": "http://securityresponse.symantec.com/avcenter/security/content/2007.09.05.html" }, { "trust": 0.1, "url": "http://marc.info/?l=full-disclosure\u0026amp;m=117396596027148\u0026amp;w=2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-1476" }, { "trust": 0.1, "url": "http://cve.mitre.org)," } ], "sources": [ { "db": "VULHUB", "id": "VHN-24838" }, { "db": "BID", "id": "22977" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "PACKETSTORM", "id": "59201" }, { "db": "CNNVD", "id": "CNNVD-200703-393" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-24838" }, { "db": "BID", "id": "22977" }, { "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "db": "PACKETSTORM", "id": "59201" }, { "db": "CNNVD", "id": "CNNVD-200703-393" }, { "db": "NVD", "id": "CVE-2007-1476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-16T00:00:00", "db": "VULHUB", "id": "VHN-24838" }, { "date": "2007-03-15T00:00:00", "db": "BID", "id": "22977" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "date": "2007-09-10T21:29:54", "db": "PACKETSTORM", "id": "59201" }, { "date": "2007-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-393" }, { "date": "2007-03-16T21:19:00", "db": "NVD", "id": "CVE-2007-1476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-24838" }, { "date": "2007-09-06T18:01:00", "db": "BID", "id": "22977" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005251" }, { "date": "2007-03-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-393" }, { "date": "2024-11-21T00:28:24.377000", "db": "NVD", "id": "CVE-2007-1476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "22977" }, { "db": "CNNVD", "id": "CNNVD-200703-393" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall Such as SYMTDI.SYS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005251" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-393" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.