Executive Summary

Informations
Name CVE-2004-0445 First vendor Publication 2004-07-07
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allows remote attackers to cause a denial of service (CPU consumption from infinite loop) via a DNS response with a compressed name pointer that points to itself.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0445

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 11
Application 1
Application 6
Application 3

Open Source Vulnerability Database (OSVDB)

Id Description
6100 Symantec Multiple Firewall DNS Response DoS

Symantec personal firewalls contain a flaw that may allow a remote attacker to freeze the system and force a reboot. The issue is due to DNS response validation code not properly handling malformed DNS packets. By sending a specially crafted single packet, an attacker can cause the system to enter an infinite loop within the kernel, effectively freezing the system. A system reboot would be required to resume normal operations.
6099 Symantec Multiple Firewall NBNS Response Processing Overflow

A remote overflow exists in Symantec Norton Personal Firewall. The product fails to check bounds in the main NBNS processing routine and can be overflowed via overwritten index variable. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2017-10-10 Symantec Firewalls DNS response denial of service attempt
RuleID : 44320 - Revision : 2 - Type : SERVER-OTHER

Sources (Detail)

http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021359.html
http://secunia.com/advisories/11066
http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html
http://securitytracker.com/id?1010144
http://securitytracker.com/id?1010145
http://securitytracker.com/id?1010146
http://www.ciac.org/ciac/bulletins/o-141.shtml
http://www.kb.cert.org/vuls/id/682110
http://www.osvdb.org/6100
http://www.securityfocus.com/bid/10336
https://exchange.xforce.ibmcloud.com/vulnerabilities/16132
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:23:03
  • Multiple Updates
2024-11-28 12:06:06
  • Multiple Updates
2021-05-04 12:02:20
  • Multiple Updates
2021-04-22 01:02:29
  • Multiple Updates
2020-05-23 00:15:47
  • Multiple Updates
2017-07-11 12:01:26
  • Multiple Updates
2016-06-28 15:05:42
  • Multiple Updates
2016-04-26 12:49:56
  • Multiple Updates
2013-05-11 11:41:37
  • Multiple Updates