ID

VAR-200707-0297


CVE

CVE-2007-3771


TITLE

Symantec AntiVirus Corporate Edition and Client Security Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2007-005857

DESCRIPTION

Stack-based buffer overflow in the Internet E-mail Auto-Protect feature in Symantec AntiVirus Corporate Edition before 10.1, and Client Security before 3.1, allows local users to cause a denial of service (service crash) via a long (1) To, (2) From, or (3) Subject header in an outbound SMTP e-mail message. NOTE: the original vendor advisory referenced CVE-2006-3456, but this was an error. This issue occurs because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to cause denial-of-service conditions. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. The vulnerability is caused due to an error within the Internet Email Auto-Protect feature when scanning outgoing email messages. This can be exploited to cause a stack overflow via an email message containing an overly long (greater than 951 characters) string in the "To:", "From:", or "Subject" fields. Successful exploitation crashes the Internet E-mail real-time protection service and results in subsequent outgoing SMTP email messages not being scanned. ORIGINAL ADVISORY: Symantec: http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11b.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-3771 // JVNDB: JVNDB-2007-005857 // BID: 24802 // VULHUB: VHN-27133 // PACKETSTORM: 57687

AFFECTED PRODUCTS

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1007

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1000

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.2.1000

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.3.1000

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.4

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.5.1100

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.5

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.2

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2021

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2011

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2002

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2001

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2000

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:2.0

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1000

Trust: 1.3

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2010

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:3.0.2

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2011

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2020

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.0.338

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.1.1007

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2002

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2000

Trust: 1.0

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1009

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:9.0.1.1.1000

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2001

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.1.1000

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0.2.2021

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:10.0

Trust: 1.0

vendor:symantecmodel:client securityscope:ltversion:3.1

Trust: 0.8

vendor:symantecmodel:norton antivirusscope:ltversion:corporate edition 10.1

Trust: 0.8

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2020

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2010

Trust: 0.3

vendor:symantecmodel:client security buildscope:eqversion:2.0.51100

Trust: 0.3

vendor:symantecmodel:client security mr4 buildscope:eqversion:2.0.41000

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:2.0.4

Trust: 0.3

vendor:symantecmodel:client security mr3 b9.0.3.1000scope:eqversion:2.0.3

Trust: 0.3

vendor:symantecmodel:client security mr2 b9.0.2.1000scope:eqversion:2.0.2

Trust: 0.3

vendor:symantecmodel:client security mr1 b9.0.1.1000scope:eqversion:2.0.1

Trust: 0.3

vendor:symantecmodel:client security stm buildscope:eqversion:2.09.0.0.338

Trust: 0.3

vendor:symantecmodel:client security (scfscope:eqversion:2.07.1)

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1008

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1001

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.0.359

Trust: 0.3

vendor:symantecmodel:client security mr6scope:neversion:2.0.6

Trust: 0.3

vendor:symantecmodel:client securityscope:neversion:3.1

Trust: 0.3

sources: BID: 24802 // JVNDB: JVNDB-2007-005857 // CNNVD: CNNVD-200707-250 // NVD: CVE-2007-3771

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3771
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-3771
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200707-250
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27133
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-3771
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27133
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27133 // JVNDB: JVNDB-2007-005857 // CNNVD: CNNVD-200707-250 // NVD: CVE-2007-3771

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3771

THREAT TYPE

local

Trust: 1.0

sources: BID: 24802 // PACKETSTORM: 57687 // CNNVD: CNNVD-200707-250

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200707-250

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005857

PATCH

title:SYM07-016url:http://securityresponse.symantec.com/avcenter/security/Content/2007.07.11b.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-005857

EXTERNAL IDS

db:NVDid:CVE-2007-3771

Trust: 2.8

db:BIDid:24802

Trust: 2.0

db:SECUNIAid:26036

Trust: 1.8

db:SECTRACKid:1018371

Trust: 1.7

db:SECTRACKid:1018367

Trust: 1.7

db:VUPENid:ADV-2007-2506

Trust: 1.7

db:OSVDBid:36115

Trust: 1.7

db:JVNDBid:JVNDB-2007-005857

Trust: 0.8

db:XFid:35354

Trust: 0.6

db:CNNVDid:CNNVD-200707-250

Trust: 0.6

db:VULHUBid:VHN-27133

Trust: 0.1

db:PACKETSTORMid:57687

Trust: 0.1

sources: VULHUB: VHN-27133 // BID: 24802 // JVNDB: JVNDB-2007-005857 // PACKETSTORM: 57687 // CNNVD: CNNVD-200707-250 // NVD: CVE-2007-3771

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2007.07.11b.html

Trust: 1.8

url:http://www.securityfocus.com/bid/24802

Trust: 1.7

url:http://osvdb.org/36115

Trust: 1.7

url:http://securitytracker.com/id?1018367

Trust: 1.7

url:http://securitytracker.com/id?1018371

Trust: 1.7

url:http://secunia.com/advisories/26036

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2506

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35354

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3771

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3771

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/35354

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2506

Trust: 0.6

url:http://www.symantec.com

Trust: 0.3

url:http://www.symantec.com/avcenter/security/content/2007.07.11b.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/26036/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:https://fileconnect.symantec.com/

Trust: 0.1

url:http://secunia.com/product/3549/

Trust: 0.1

url:http://secunia.com/product/6649/

Trust: 0.1

url:http://secunia.com/product/3478/

Trust: 0.1

url:http://secunia.com/product/5555/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27133 // BID: 24802 // JVNDB: JVNDB-2007-005857 // PACKETSTORM: 57687 // CNNVD: CNNVD-200707-250 // NVD: CVE-2007-3771

CREDITS

Jordi Corrales is credited with discovering this issue.

Trust: 0.9

sources: BID: 24802 // CNNVD: CNNVD-200707-250

SOURCES

db:VULHUBid:VHN-27133
db:BIDid:24802
db:JVNDBid:JVNDB-2007-005857
db:PACKETSTORMid:57687
db:CNNVDid:CNNVD-200707-250
db:NVDid:CVE-2007-3771

LAST UPDATE DATE

2024-11-23T21:49:02.322000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27133date:2017-07-29T00:00:00
db:BIDid:24802date:2015-05-07T17:37:00
db:JVNDBid:JVNDB-2007-005857date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200707-250date:2007-07-17T00:00:00
db:NVDid:CVE-2007-3771date:2024-11-21T00:34:01.600

SOURCES RELEASE DATE

db:VULHUBid:VHN-27133date:2007-07-15T00:00:00
db:BIDid:24802date:2007-07-11T00:00:00
db:JVNDBid:JVNDB-2007-005857date:2012-12-20T00:00:00
db:PACKETSTORMid:57687date:2007-07-13T00:55:11
db:CNNVDid:CNNVD-200707-250date:2007-07-15T00:00:00
db:NVDid:CVE-2007-3771date:2007-07-15T22:30:00