var-200804-0256
Vulnerability from variot
The ActiveDataInfo.LaunchProcess method in the SymAData.ActiveDataInfo.1 ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, does not properly determine the location of the AutoFix Tool, which allows remote attackers to execute arbitrary code via a remote (1) WebDAV or (2) SMB share. An ActiveX control in the Symantec AutoFix Tool is prone to a vulnerability due to an insecure method. Attackers can leverage this issue to load an arbitrary file onto a victim's computer and then execute it with the privileges of the application running the control (typically Internet Explorer). This issue is exploitable only when a victim's computer is configured to allow remote connections to WebDav or SMB shares. Successful exploits will compromise affected computers. iDefense Security Advisory 04.02.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 02, 2008
I. BACKGROUND
Norton Internet Security 2008 is a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic. More information can be found on the vendor's site at the following URL.
http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008
II.
III. In order for exploitation to occur, an attacker would have to lure a vulnerable user to a malicious web site.
While this control is marked as safe for scripting, the control has been designed so that it can only be run from the "symantec.com" domain. In practice this requirement can be bypassed through the use of any Cross Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation could also occur through the use of DNS poisoning attacks.
IV. DETECTION
iDefense confirmed that this vulnerability exists in version 2.7.0.1 of the control that is installed with the 2008 version of Norton Internet Security. Other versions may also be available.
V. WORKAROUND
Setting the kill-bit for this control will prevent it from being loaded within Internet Explorer. However, doing so will prevent legitimate use of the control.
VI. VENDOR RESPONSE
Symantec has addressed this vulnerability by releasing updates. For more information, refer to their advisory at the following URL.
http://www.symantec.com/avcenter/security/Content/2008.04.02a.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0313 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
12/14/2007 Initial vendor notification 12/14/2007 Initial vendor response 04/02/2008 Coordinated public disclosure
IX. CREDIT
The discoverer of this vulnerability wishes to remain anonymous.
Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2008 iDefense, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
2) A design error in the same ActiveX control can be exploited to e.g. load and execute arbitrary code from a remote share. conducts DNS poisoning or cross-site scripting attacks as the ActiveX control is site-locked and can only be scripted from a trusted domain. https://www-secure.symantec.com/techsupp/asa/install.jsp
PROVIDED AND/OR DISCOVERED BY: The vendor credits Peter Vreugdenhill and an anonymous person, both reported via iDefense Labs.
ORIGINAL ADVISORY: SYM08-009: http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton 360", "scope": "eq", "trust": 2.4, "vendor": "symantec", "version": "1.0" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.9, "vendor": "symantec", "version": "2006" }, { "model": "system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2007" }, { "model": "system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2008" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2007" }, { "model": "norton antivirus", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2008" }, { "model": "system works", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2006" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2007" }, { "model": "norton internet security", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2008" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 to 2008" }, { "model": "norton internet security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 to 2008" }, { "model": "system works", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 to 2008" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20080" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20080" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20080" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3601.0" } ], "sources": [ { "db": "BID", "id": "28509" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "CNNVD", "id": "CNNVD-200804-091" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:norton_360", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_antivirus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:norton_internet_security", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:system_works", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005386" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Peter Vreugdenhill", "sources": [ { "db": "CNNVD", "id": "CNNVD-200804-091" } ], "trust": 0.6 }, "cve": "CVE-2008-0313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2008-0313", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-30438", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0313", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-0313", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200804-091", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-30438", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-30438" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "CNNVD", "id": "CNNVD-200804-091" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ActiveDataInfo.LaunchProcess method in the SymAData.ActiveDataInfo.1 ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, does not properly determine the location of the AutoFix Tool, which allows remote attackers to execute arbitrary code via a remote (1) WebDAV or (2) SMB share. An ActiveX control in the Symantec AutoFix Tool is prone to a vulnerability due to an insecure method. \nAttackers can leverage this issue to load an arbitrary file onto a victim\u0027s computer and then execute it with the privileges of the application running the control (typically Internet Explorer). This issue is exploitable only when a victim\u0027s computer is configured to allow remote connections to WebDav or SMB shares. \nSuccessful exploits will compromise affected computers. iDefense Security Advisory 04.02.08\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nApr 02, 2008\n\nI. BACKGROUND\n\nNorton Internet Security 2008 is a system security suite that offers\nprotection from spyware, viruses, identity theft, spam, and malicious\nnetwork traffic. More information can be found on the vendor\u0027s site at\nthe following URL. \n\nhttp://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is\u0026pvid=nis2008\n\nII. \n\nIII. In order for exploitation\nto occur, an attacker would have to lure a vulnerable user to a\nmalicious web site. \n\nWhile this control is marked as safe for scripting, the control has been\ndesigned so that it can only be run from the \"symantec.com\" domain. In\npractice this requirement can be bypassed through the use of any Cross\nSite Scripting (XSS) vulnerabilities in the Symantec domain. \nExploitation could also occur through the use of DNS poisoning attacks. \n\nIV. DETECTION\n\niDefense confirmed that this vulnerability exists in version 2.7.0.1 of\nthe control that is installed with the 2008 version of Norton Internet\nSecurity. Other versions may also be available. \n\nV. WORKAROUND\n\nSetting the kill-bit for this control will prevent it from being loaded\nwithin Internet Explorer. However, doing so will prevent legitimate use\nof the control. \n\nVI. VENDOR RESPONSE\n\nSymantec has addressed this vulnerability by releasing updates. For more\ninformation, refer to their advisory at the following URL. \n\nhttp://www.symantec.com/avcenter/security/Content/2008.04.02a.html\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2008-0313 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n12/14/2007 Initial vendor notification\n12/14/2007 Initial vendor response\n04/02/2008 Coordinated public disclosure\n\nIX. CREDIT\n\nThe discoverer of this vulnerability wishes to remain anonymous. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2008 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\n2) A design error in the same ActiveX control can be exploited to\ne.g. load and execute arbitrary code from a remote share. conducts DNS\npoisoning or cross-site scripting attacks as the ActiveX control is\nsite-locked and can only be scripted from a trusted domain. \nhttps://www-secure.symantec.com/techsupp/asa/install.jsp\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Peter Vreugdenhill and an anonymous person, both\nreported via iDefense Labs. \n\nORIGINAL ADVISORY:\nSYM08-009:\nhttp://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor", "sources": [ { "db": "NVD", "id": "CVE-2008-0313" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "BID", "id": "28509" }, { "db": "VULHUB", "id": "VHN-30438" }, { "db": "PACKETSTORM", "id": "65191" }, { "db": "PACKETSTORM", "id": "65155" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-30438", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30438" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0313", "trust": 2.9 }, { "db": "BID", "id": "28509", "trust": 2.0 }, { "db": "SECUNIA", "id": "29660", "trust": 1.8 }, { "db": "SECTRACK", "id": "1019752", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019751", "trust": 1.7 }, { "db": "SECTRACK", "id": "1019753", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1077", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-005386", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200804-091", "trust": 0.7 }, { "db": "XF", "id": "41631", "trust": 0.6 }, { "db": "IDEFENSE", "id": "20080402 SYMANTEC INTERNET SECURITY 2008 ACTIVEDATAINFO.LAUNCHPROCESS DESIGN ERROR VULNERABILITY", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "65191", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-30438", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65155", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30438" }, { "db": "BID", "id": "28509" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "PACKETSTORM", "id": "65191" }, { "db": "PACKETSTORM", "id": "65155" }, { "db": "CNNVD", "id": "CNNVD-200804-091" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "id": "VAR-200804-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30438" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:43:13.084000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM08-009", "trust": 0.8, "url": "http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005386" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://securityresponse.symantec.com/avcenter/security/content/2008.04.02a.html" }, { "trust": 2.0, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=678" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/28509" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019751" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019752" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1019753" }, { "trust": 1.7, "url": "http://secunia.com/advisories/29660" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/1077/references" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41631" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0313" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0313" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41631" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/1077/references" }, { "trust": 0.3, "url": "http://support.microsoft.com/kb/240797" }, { "trust": 0.3, "url": "http://www.symantec.com/norton/products/index.jsp" }, { "trust": 0.3, "url": "/archive/1/490469" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0313" }, { "trust": 0.1, "url": "http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is\u0026pvid=nis2008" }, { "trust": 0.1, "url": "http://cve.mitre.org/)," }, { "trust": 0.1, "url": "http://www.symantec.com/avcenter/security/content/2008.04.02a.html" }, { "trust": 0.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/" }, { "trust": 0.1, "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php" }, { "trust": 0.1, "url": "http://labs.idefense.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/6635/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/16476/" }, { "trust": 0.1, "url": "http://secunia.com/product/6636/" }, { "trust": 0.1, "url": "http://secunia.com/product/18165/" }, { "trust": 0.1, "url": "http://secunia.com/product/15952/" }, { "trust": 0.1, "url": "https://www-secure.symantec.com/techsupp/asa/install.jsp" }, { "trust": 0.1, "url": "http://secunia.com/product/16595/" }, { "trust": 0.1, "url": "http://secunia.com/product/14022/" }, { "trust": 0.1, "url": "http://secunia.com/product/18166/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/6634/" }, { "trust": 0.1, "url": "http://secunia.com/product/16477/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/29660/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30438" }, { "db": "BID", "id": "28509" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "PACKETSTORM", "id": "65191" }, { "db": "PACKETSTORM", "id": "65155" }, { "db": "CNNVD", "id": "CNNVD-200804-091" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-30438" }, { "db": "BID", "id": "28509" }, { "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "db": "PACKETSTORM", "id": "65191" }, { "db": "PACKETSTORM", "id": "65155" }, { "db": "CNNVD", "id": "CNNVD-200804-091" }, { "db": "NVD", "id": "CVE-2008-0313" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-04-08T00:00:00", "db": "VULHUB", "id": "VHN-30438" }, { "date": "2008-04-02T00:00:00", "db": "BID", "id": "28509" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "date": "2008-04-04T22:56:33", "db": "PACKETSTORM", "id": "65191" }, { "date": "2008-04-04T20:56:23", "db": "PACKETSTORM", "id": "65155" }, { "date": "2008-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-091" }, { "date": "2008-04-08T17:05:00", "db": "NVD", "id": "CVE-2008-0313" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-08T00:00:00", "db": "VULHUB", "id": "VHN-30438" }, { "date": "2008-04-04T18:59:00", "db": "BID", "id": "28509" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005386" }, { "date": "2008-11-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200804-091" }, { "date": "2024-11-21T00:41:39.137000", "db": "NVD", "id": "CVE-2008-0313" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "65191" }, { "db": "CNNVD", "id": "CNNVD-200804-091" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Norton 360 Such as Symantec Norton Product ActiveDataInfo.LaunchProcess Vulnerability in arbitrary code execution in method", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005386" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "28509" }, { "db": "CNNVD", "id": "CNNVD-200804-091" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.