var-200704-0544
Vulnerability from variot
SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected. Multiple Symantec products are prone to a local denial-of-service vulnerability. This issue occurs when attackers supply invalid argument values to the 'SPBBCDrv.sys' driver. A local attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec Norton Personal Firewall is a very popular firewall software. There is a loophole in the driver implementation of Norton Personal Firewall, and local attackers may use this loophole to perform denial-of-service attacks on the system.
The vulnerability is caused due to an input validation error in SPBBCDrv.sys when handling parameters of certain hooked functions. This can be exploited to crash the system by calling NtCreateMutant or NtOpenEvent with specially crafted parameters.
The vulnerability is confirmed in version 9.0.0.73 and also reported in versions 9.1.1.7 and 9.1.0.33. Other versions may also be affected.
SOLUTION: Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY: Matousec Transparent Security
ORIGINAL ADVISORY: Matousec Transparent Security: http://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200704-0544", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.394" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.400" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.396" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2020" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2011" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.0.2.2021" }, { "model": "client security", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "3.1.401" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.1.0.396" }, { "model": "client security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "3.1.0.401" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1008" }, { "model": "norton antispam", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.0.359" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1001" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2004" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2000" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2005" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1000" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2010" }, { "model": "norton system works", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "2006" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2001" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.1.1007" }, { "model": "client security", "scope": "eq", "trust": 1.3, "vendor": "symantec", "version": "3.0.2.2002" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.1" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.6" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.2" }, { "model": "norton 360", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "1.0" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "norton system works", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.9" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2.2" }, { "model": "norton system works", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.1.1" }, { "model": "norton antispam", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.7" }, { "model": "client security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "3.0.1.1009" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006_9.1.0.33" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.8" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.2" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2006_9.1.1.7" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2007" }, { "model": "norton internet security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2008" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2007" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.3" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2008" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.4" }, { "model": "norton personal firewall", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "2004" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0.5" }, { "model": "antivirus", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "10.0" }, { "model": "client security", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton 360", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton antispam", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton antivirus", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "norton internet security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2008 15.0.0.60 and 2006 other up to" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 9.1.0.33 and 9.1.1.7" }, { "model": "norton systemworks", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "antivirus", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.6.6000" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1007" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.1.7" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.5.6.14" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks premier", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.394" }, { "model": "norton internet security anti spyware edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.600" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.6.6000" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition mr7", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.400" }, { "model": "client security mr6", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition mr6 mp1", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "norton system works", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.401" }, { "model": "client security mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1.4-4010" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.396" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3601.0" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.0" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20080" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4.4010" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.0.9" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1000" }, { "model": "antivirus corporate edition mr6", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.33" }, { "model": "norton system works premier", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20080" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1.1008" }, { "model": "client security mr7", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "norton system works", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "norton antispam", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.0.359" }, { "model": "norton system works", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200511.0.9" }, { "model": "antivirus corporate edition mr4 mp1 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1.4-4010" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "client security mr6 mp1", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" } ], "sources": [ { "db": "BID", "id": "23241" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "CNNVD", "id": "CNNVD-200704-033" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:client_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_360", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antispam", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_system_works", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:antivirus", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005331" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Matousek\u203b david@matousec.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-033" } ], "trust": 0.6 }, "cve": "CVE-2007-1793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2007-1793", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-25155", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-1793", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-1793", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200704-033", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-25155", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-25155" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "CNNVD", "id": "CNNVD-200704-033" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SPBBCDrv.sys in Symantec Norton Personal Firewall 2006 9.1.0.33 and 9.1.1.7 does not validate certain arguments before being passed to hooked SSDT function handlers, which allows local users to cause a denial of service (crash) or possibly execute arbitrary code via crafted arguments to the (1) NtCreateMutant and (2) NtOpenEvent functions. NOTE: it was later reported that Norton Internet Security 2008 15.0.0.60, and possibly other versions back to 2006, are also affected. Multiple Symantec products are prone to a local denial-of-service vulnerability. \nThis issue occurs when attackers supply invalid argument values to the \u0027SPBBCDrv.sys\u0027 driver. \nA local attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec Norton Personal Firewall is a very popular firewall software. There is a loophole in the driver implementation of Norton Personal Firewall, and local attackers may use this loophole to perform denial-of-service attacks on the system. \n\nThe vulnerability is caused due to an input validation error in\nSPBBCDrv.sys when handling parameters of certain hooked functions. \nThis can be exploited to crash the system by calling NtCreateMutant\nor NtOpenEvent with specially crafted parameters. \n\nThe vulnerability is confirmed in version 9.0.0.73 and also reported\nin versions 9.1.1.7 and 9.1.0.33. Other versions may also be\naffected. \n\nSOLUTION:\nRestrict access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nMatousec Transparent Security\n\nORIGINAL ADVISORY:\nMatousec Transparent Security:\nhttp://www.matousec.com/info/advisories/Norton-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-1793" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "BID", "id": "23241" }, { "db": "VULHUB", "id": "VHN-25155" }, { "db": "PACKETSTORM", "id": "55533" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-25155", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-25155" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1793", "trust": 2.8 }, { "db": "BID", "id": "23241", "trust": 2.0 }, { "db": "SECUNIA", "id": "24677", "trust": 1.8 }, { "db": "SECTRACK", "id": "1021388", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017837", "trust": 1.7 }, { "db": "SECTRACK", "id": "1021386", "trust": 1.7 }, { "db": "SECTRACK", "id": "1017838", "trust": 1.7 }, { "db": "SECTRACK", "id": "1021387", "trust": 1.7 }, { "db": "SECTRACK", "id": "1021389", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-1192", "trust": 1.7 }, { "db": "OSVDB", "id": "34692", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-005331", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200704-033", "trust": 0.7 }, { "db": "XF", "id": "33352", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070918 PLAGUE IN (SECURITY) SOFTWARE DRIVERS \u0026 BSDOHOOK UTILITY", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070401 NORTON MULTIPLE INSUFFICIENT ARGUMENT VALIDATION OF HOOKED SSDT FUNCTION VULNERABILITY", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-83289", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29810", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-25155", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "55533", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-25155" }, { "db": "BID", "id": "23241" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "PACKETSTORM", "id": "55533" }, { "db": "CNNVD", "id": "CNNVD-200704-033" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "id": "VAR-200704-0544", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-25155" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:48:52.007000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM08-022", "trust": 0.8, "url": "http://www.symantec.com/avcenter/security/Content/2008.12.12.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005331" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-25155" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.matousec.com/info/advisories/norton-multiple-insufficient-argument-validation-of-hooked-ssdt-functions.php" }, { "trust": 2.0, "url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/23241" }, { "trust": 1.7, "url": "http://securityresponse.symantec.com/avcenter/security/content/2008.12.12.html" }, { "trust": 1.7, "url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php" }, { "trust": 1.7, "url": "http://osvdb.org/34692" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1017837" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1017838" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021386" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021387" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021388" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021389" }, { "trust": 1.7, "url": "http://secunia.com/advisories/24677" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/464456/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/1192" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33352" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1793" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1793" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/1192" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/33352" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/479830/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/464456/100/0/threaded" }, { "trust": 0.3, "url": "http://www.symantec.com/sabu/nis/npf/" }, { "trust": 0.3, "url": "/archive/1/464456" }, { "trust": 0.3, "url": "/archive/1/479830" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2008.12.12.html" }, { "trust": 0.1, "url": "http://secunia.com/product/6638/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/disassembling_og_reversing/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/linux_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/24677/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-25155" }, { "db": "BID", "id": "23241" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "PACKETSTORM", "id": "55533" }, { "db": "CNNVD", "id": "CNNVD-200704-033" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-25155" }, { "db": "BID", "id": "23241" }, { "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "db": "PACKETSTORM", "id": "55533" }, { "db": "CNNVD", "id": "CNNVD-200704-033" }, { "db": "NVD", "id": "CVE-2007-1793" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-04-02T00:00:00", "db": "VULHUB", "id": "VHN-25155" }, { "date": "2007-04-01T00:00:00", "db": "BID", "id": "23241" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "date": "2007-04-02T23:13:40", "db": "PACKETSTORM", "id": "55533" }, { "date": "2007-04-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-033" }, { "date": "2007-04-02T22:19:00", "db": "NVD", "id": "CVE-2007-1793" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-25155" }, { "date": "2008-12-11T23:31:00", "db": "BID", "id": "23241" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005331" }, { "date": "2009-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-033" }, { "date": "2024-11-21T00:29:10.343000", "db": "NVD", "id": "CVE-2007-1793" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "23241" }, { "db": "PACKETSTORM", "id": "55533" }, { "db": "CNNVD", "id": "CNNVD-200704-033" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall of SPBBCDrv.sys Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005331" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-033" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.