ID

VAR-200705-0001


CVE

CVE-2006-3456


TITLE

Norton AntiVirus Used in etc. Symantec NAVOPTS.DLL ActiveX Control crash vulnerability in control

Trust: 0.8

sources: JVNDB: JVNDB-2007-004818

DESCRIPTION

The Symantec NAVOPTS.DLL ActiveX control (aka Symantec.Norton.AntiVirus.NAVOptions) 12.2.0.13, as used in Norton AntiVirus, Internet Security, and System Works 2005 and 2006, is designed for use only in application-embedded web browsers, which allows remote attackers to "crash the control" via unspecified vectors related to content on a web site, and place Internet Explorer into a "defunct state" in which remote attackers can execute arbitrary code in addition to other Symantec ActiveX controls, regardless of whether they are marked safe for scripting. NOTE: this CVE was inadvertently used for an E-mail Auto-Protect issue, but that issue has been assigned CVE-2007-3771. (2) Internet Explorer The "defunc state" Regardless of the setting for whether scripting is safe or not. Symantec ActiveX An arbitrary code execution vulnerability exists with the control. This vulnerability E-mail Auto-Protect However, the problem is CVE-2007-3771 Has been assigned.A third party may be affected by: (1) " Crash control " There is a possibility that. (2) other Symantec ActiveX Arbitrary code, including controls, could be executed. An attacker may exploit this issue by enticing victims into opening a maliciously crafted HTML document. Successful exploits will allow attackers to execute arbitrary code in the context of the user visiting a malicious web page. Failed exploit attempts will likely result in denial-of-service conditions. Symantec Norton Internet Security 2006 COM Object Security ByPass Vulnerability iDefense Security Advisory 05.09.07 http://labs.idefense.com/intelligence/vulnerabilities/ May 09, 2007 I. BACKGROUND Norton Internet Security 2006 is a comprehensive system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic. More information can be found on the vendors site at the following URL. http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2006 II. When this control is loaded in a standard browser window, it throws an error during initialization which leaves the browser in a defunct state. After the error dialog displays, other Symantec ActiveX Controls can be created without error even if they are not marked as safe for scripting. This can lead to remote code execution if the unsafe controls contain exploitable methods. III. IV. DETECTION iDefense confirmed the existence of this vulnerability within version 12.2.0.13 of NavOpts.dll as distributed with Norton Internet Security 2006. Prior versions are suspected to be vulnerable. V. Although this will prevent potential exploitation, it may also negatively impact the functionality of the application. VI. VENDOR RESPONSE Symantec has addressed this vulnerability with a software update. The update is available via their LiveUpdate channels. For more information, consult their advisory at the following URL. http://www.symantec.com/avcenter/security/Content/2007.05.09.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-3456 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/13/2006 Initial vendor notification 12/13/2006 Initial vendor response 05/09/2007 Coordinated public disclosure IX. CREDIT This vulnerability was reported to iDefense by Peter Vreugdenhil. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2007 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. This can be exploited to e.g. Set the kill-bit for the affected ActiveX control. PROVIDED AND/OR DISCOVERED BY: Discovered by Peter Vreugdenhil and reported via iDefense Labs. ORIGINAL ADVISORY: Symantec: http://www.symantec.com/avcenter/security/Content/2007.05.09.html iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2006-3456 // JVNDB: JVNDB-2007-004818 // BID: 23822 // VULHUB: VHN-19564 // PACKETSTORM: 56632 // PACKETSTORM: 56638

AFFECTED PRODUCTS

vendor:symantecmodel:norton internet securityscope:eqversion:2005

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:2005

Trust: 1.9

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton system worksscope:eqversion:2005

Trust: 1.6

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:12.2.0.13

Trust: 0.8

vendor:symantecmodel:norton internet securityscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:2005 and 2006

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20050

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

sources: BID: 23822 // JVNDB: JVNDB-2007-004818 // CNNVD: CNNVD-200705-231 // NVD: CVE-2006-3456

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3456
value: HIGH

Trust: 1.0

NVD: CVE-2006-3456
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-231
value: HIGH

Trust: 0.6

VULHUB: VHN-19564
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-3456
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-19564
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-19564 // JVNDB: JVNDB-2007-004818 // CNNVD: CNNVD-200705-231 // NVD: CVE-2006-3456

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-19564 // JVNDB: JVNDB-2007-004818 // NVD: CVE-2006-3456

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 56632 // CNNVD: CNNVD-200705-231

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-200705-231

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004818

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-19564

PATCH

title:SYM07-005url:http://www.symantec.com/avcenter/security/Content/2007.05.09.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-004818

EXTERNAL IDS

db:NVDid:CVE-2006-3456

Trust: 2.9

db:BIDid:23822

Trust: 2.0

db:SECUNIAid:25172

Trust: 1.8

db:VUPENid:ADV-2007-1751

Trust: 1.7

db:SECTRACKid:1018031

Trust: 1.7

db:OSVDBid:35075

Trust: 1.1

db:JVNDBid:JVNDB-2007-004818

Trust: 0.8

db:XFid:34200

Trust: 0.6

db:IDEFENSEid:20070509 SYMANTEC NORTON INTERNET SECURITY 2006 COM OBJECT SECURITY BYPASS VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200705-231

Trust: 0.6

db:PACKETSTORMid:56632

Trust: 0.2

db:VULHUBid:VHN-19564

Trust: 0.1

db:PACKETSTORMid:56638

Trust: 0.1

sources: VULHUB: VHN-19564 // BID: 23822 // JVNDB: JVNDB-2007-004818 // PACKETSTORM: 56632 // PACKETSTORM: 56638 // CNNVD: CNNVD-200705-231 // NVD: CVE-2006-3456

REFERENCES

url:http://www.symantec.com/avcenter/security/content/2007.05.09.html

Trust: 2.2

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=529

Trust: 1.8

url:http://www.securityfocus.com/bid/23822

Trust: 1.7

url:http://www.securitytracker.com/id?1018031

Trust: 1.7

url:http://secunia.com/advisories/25172

Trust: 1.7

url:http://osvdb.org/35075

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/1751

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34200

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3456

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3456

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/34200

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/1751

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/468116

Trust: 0.3

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3456

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2006

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://secunia.com/product/4009/

Trust: 0.1

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/4848/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/advisories/25172/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4847/

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-19564 // BID: 23822 // JVNDB: JVNDB-2007-004818 // PACKETSTORM: 56632 // PACKETSTORM: 56638 // CNNVD: CNNVD-200705-231 // NVD: CVE-2006-3456

CREDITS

Peter Vreugdenhil

Trust: 0.6

sources: CNNVD: CNNVD-200705-231

SOURCES

db:VULHUBid:VHN-19564
db:BIDid:23822
db:JVNDBid:JVNDB-2007-004818
db:PACKETSTORMid:56632
db:PACKETSTORMid:56638
db:CNNVDid:CNNVD-200705-231
db:NVDid:CVE-2006-3456

LAST UPDATE DATE

2024-11-23T22:36:14.882000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-19564date:2017-07-20T00:00:00
db:BIDid:23822date:2007-05-10T02:49:00
db:JVNDBid:JVNDB-2007-004818date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200705-231date:2007-05-11T00:00:00
db:NVDid:CVE-2006-3456date:2024-11-21T00:13:39.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-19564date:2007-05-11T00:00:00
db:BIDid:23822date:2007-05-09T00:00:00
db:JVNDBid:JVNDB-2007-004818date:2012-12-20T00:00:00
db:PACKETSTORMid:56632date:2007-05-10T03:56:05
db:PACKETSTORMid:56638date:2007-05-11T00:35:58
db:CNNVDid:CNNVD-200705-231date:2007-05-11T00:00:00
db:NVDid:CVE-2006-3456date:2007-05-11T10:19:00