ID

VAR-200610-0183


CVE

CVE-2006-5404


TITLE

Symantec Automated Support Assistant ActiveX control buffer overflow

Trust: 0.8

sources: CERT/CC: VU#400601

DESCRIPTION

Unspecified vulnerability in an ActiveX control used in Symantec Automated Support Assistant, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, allows user-assisted remote attackers to obtain sensitive information via unspecified vectors. This vulnerability requires a certain amount of user-interaction for an attack to occur, such as visiting a malicious website. A successful exploit would let a remote attacker execute code with the privileges of the currently logged-in user. Therefore, the affected control may be present on computers running other consumer products and versions as well. Symantec Corporate and Enterprise products are not affected, because they do not install the affected control. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. 1) An unspecified input validation error exists, which can be exploited to gain unauthorized access to system information. Successful exploitation requires spoofing of a trusted domain web site and to trick the user to click on a malicious link. Automated Support Assistant: Update to the latest version. https://www-secure.symantec.com/techsupp/asa/install.jsp PROVIDED AND/OR DISCOVERED BY: The vendor credits John Haesman, Next Generation Security Research. ORIGINAL ADVISORY: http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2006-5404 // CERT/CC: VU#400601 // JVNDB: JVNDB-2006-003319 // BID: 20348 // VULHUB: VHN-21512 // PACKETSTORM: 50672

AFFECTED PRODUCTS

vendor:symantecmodel:norton system worksscope:eqversion:2005

Trust: 1.6

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:automated support assistantscope: - version: -

Trust: 1.4

vendor:symantecmodel:norton antivirusscope: - version: -

Trust: 1.4

vendor:symantecmodel:norton antivirusscope:eqversion:*

Trust: 1.0

vendor:symantecmodel:automated support assistantscope:eqversion:*

Trust: 1.0

vendor:symantecmodel: - scope: - version: -

Trust: 0.8

vendor:symantecmodel:norton internet securityscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:2005 and 2006

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20050

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:2005

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:2005

Trust: 0.3

vendor:symantecmodel:automated support assistantscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#400601 // BID: 20348 // JVNDB: JVNDB-2006-003319 // CNNVD: CNNVD-200610-316 // NVD: CVE-2006-5404

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5404
value: LOW

Trust: 1.0

CARNEGIE MELLON: VU#400601
value: 1.16

Trust: 0.8

NVD: CVE-2006-5404
value: LOW

Trust: 0.8

CNNVD: CNNVD-200610-316
value: LOW

Trust: 0.6

VULHUB: VHN-21512
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2006-5404
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-21512
severity: LOW
baseScore: 2.6
vectorString: AV:N/AC:H/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#400601 // VULHUB: VHN-21512 // JVNDB: JVNDB-2006-003319 // CNNVD: CNNVD-200610-316 // NVD: CVE-2006-5404

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-5404

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200610-316

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 20348 // CNNVD: CNNVD-200610-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003319

PATCH

title:SYM06-019url:http://securityresponse.symantec.com/avcenter/security/Content/2006.10.05.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-003319

EXTERNAL IDS

db:BIDid:20348

Trust: 2.8

db:SECUNIAid:22228

Trust: 2.6

db:SECTRACKid:1016988

Trust: 2.5

db:SECTRACKid:1016989

Trust: 2.5

db:SECTRACKid:1016990

Trust: 2.5

db:SECTRACKid:1016991

Trust: 2.5

db:NVDid:CVE-2006-5404

Trust: 2.5

db:VUPENid:ADV-2006-3929

Trust: 1.7

db:CERT/CCid:VU#400601

Trust: 1.1

db:JVNDBid:JVNDB-2006-003319

Trust: 0.8

db:CNNVDid:CNNVD-200610-316

Trust: 0.7

db:XFid:29366

Trust: 0.6

db:VULHUBid:VHN-21512

Trust: 0.1

db:PACKETSTORMid:50672

Trust: 0.1

sources: CERT/CC: VU#400601 // VULHUB: VHN-21512 // BID: 20348 // JVNDB: JVNDB-2006-003319 // PACKETSTORM: 50672 // CNNVD: CNNVD-200610-316 // NVD: CVE-2006-5404

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2006.10.05.html

Trust: 2.1

url:http://www.securityfocus.com/bid/20348

Trust: 1.7

url:http://securitytracker.com/id?1016988

Trust: 1.7

url:http://securitytracker.com/id?1016989

Trust: 1.7

url:http://securitytracker.com/id?1016990

Trust: 1.7

url:http://securitytracker.com/id?1016991

Trust: 1.7

url:http://secunia.com/advisories/22228

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/3929

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/29366

Trust: 1.1

url:http://www.symantec.com/avcenter/security/content/2006.10.05.html

Trust: 0.8

url:http://www.securityfocus.com/bid/20348

Trust: 0.8

url:http://securitytracker.com/id?1016988

Trust: 0.8

url:http://securitytracker.com/id?1016989

Trust: 0.8

url:http://securitytracker.com/id?1016990

Trust: 0.8

url:http://securitytracker.com/id?1016991

Trust: 0.8

url:http://secunia.com/advisories/22228

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5404

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5404

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29366

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3929

Trust: 0.6

url:http://www.symantec.com

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/400601

Trust: 0.3

url:http://secunia.com/product/4009/

Trust: 0.1

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4848/

Trust: 0.1

url:http://secunia.com/product/12212/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/22228/

Trust: 0.1

url:https://www-secure.symantec.com/techsupp/asa/install.jsp

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4847/

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#400601 // VULHUB: VHN-21512 // BID: 20348 // JVNDB: JVNDB-2006-003319 // PACKETSTORM: 50672 // CNNVD: CNNVD-200610-316 // NVD: CVE-2006-5404

CREDITS

John Haesman

Trust: 0.6

sources: CNNVD: CNNVD-200610-316

SOURCES

db:CERT/CCid:VU#400601
db:VULHUBid:VHN-21512
db:BIDid:20348
db:JVNDBid:JVNDB-2006-003319
db:PACKETSTORMid:50672
db:CNNVDid:CNNVD-200610-316
db:NVDid:CVE-2006-5404

LAST UPDATE DATE

2024-08-14T14:15:39.628000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#400601date:2006-11-08T00:00:00
db:VULHUBid:VHN-21512date:2017-07-20T00:00:00
db:BIDid:20348date:2006-11-13T19:07:00
db:JVNDBid:JVNDB-2006-003319date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200610-316date:2006-10-19T00:00:00
db:NVDid:CVE-2006-5404date:2017-07-20T01:33:43.307

SOURCES RELEASE DATE

db:CERT/CCid:VU#400601date:2006-11-08T00:00:00
db:VULHUBid:VHN-21512date:2006-10-19T00:00:00
db:BIDid:20348date:2006-10-05T00:00:00
db:JVNDBid:JVNDB-2006-003319date:2012-12-20T00:00:00
db:PACKETSTORMid:50672date:2006-10-08T20:37:03
db:CNNVDid:CNNVD-200610-316date:2006-10-18T00:00:00
db:NVDid:CVE-2006-5404date:2006-10-19T01:07:00