ID

VAR-200708-0008


CVE

CVE-2007-2955


TITLE

Norton AntiVirus Used in products such as NavComUI.dll Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2007-005630

DESCRIPTION

Multiple unspecified "input validation error" vulnerabilities in multiple ActiveX controls in NavComUI.dll, as used in multiple Norton AntiVirus, Internet Security, and System Works products for 2006, allows remote attackers to execute arbitrary code via (1) the AnomalyList property to AxSysListView32 and (2) Anomaly property to AxSysListView32OAA. Multiple Symantec Norton products are prone to a remote code-execution vulnerability. This issue occurs in ActiveX controls that are shared across multiple products. Invoking the object from a malicious website or HTML email may trigger this condition. Successful exploits allow remote attackers to execute code and to compromise affected computers. Failed exploit attempts likely result in computer crashes. The following products are vulnerable to this issue: Norton Antivirus 2006 Norton Internet Security 2006 Norton Internet Security, Anti Spyware Edition 2005 Norton System Works 2006. Symantec Norton AntiVirus is a powerful antivirus program. There is a loophole in the implementation of the ActiveX control provided by the NavComUI.dll library of Norton products, and remote attackers may use this loophole to control the user's system. If the user is tricked into visiting a malicious webpage, it may cause the browser to crash or execute arbitrary code. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. The vulnerabilities are caused due to errors in the AxSysListView32 and AxSysListView32OAA ActiveX controls (NavComUI.dll) when handling the "AnomalyList" and "Anomaly" properties respectively as they take a VARIANT* as argument. Successful exploitation allows execution of arbitrary code. PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2007-53/ Symantec: http://www.symantec.com/avcenter/security/Content/2007.08.09.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-2955 // JVNDB: JVNDB-2007-005630 // BID: 24983 // VULHUB: VHN-26317 // PACKETSTORM: 58392

AFFECTED PRODUCTS

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 1.9

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.9

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton internet securityscope:eqversion:2005

Trust: 1.6

vendor:symantecmodel:norton antivirusscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton internet securityscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:2006

Trust: 0.8

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton internet security anti spyware editionscope:eqversion:20050

Trust: 0.3

sources: BID: 24983 // JVNDB: JVNDB-2007-005630 // CNNVD: CNNVD-200708-151 // NVD: CVE-2007-2955

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2955
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-2955
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-151
value: MEDIUM

Trust: 0.6

VULHUB: VHN-26317
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-2955
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-26317
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-26317 // JVNDB: JVNDB-2007-005630 // CNNVD: CNNVD-200708-151 // NVD: CVE-2007-2955

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2955

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-151

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200708-151

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005630

PATCH

title:SYM07- 021url:http://www.symantec.com/avcenter/security/Content/2007.08.09.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-005630

EXTERNAL IDS

db:NVDid:CVE-2007-2955

Trust: 2.8

db:BIDid:24983

Trust: 2.0

db:SECUNIAid:25215

Trust: 1.8

db:SECTRACKid:1018547

Trust: 1.7

db:SECTRACKid:1018546

Trust: 1.7

db:SECTRACKid:1018545

Trust: 1.7

db:VUPENid:ADV-2007-2822

Trust: 1.7

db:JVNDBid:JVNDB-2007-005630

Trust: 0.8

db:XFid:35944

Trust: 0.6

db:CNNVDid:CNNVD-200708-151

Trust: 0.6

db:VULHUBid:VHN-26317

Trust: 0.1

db:PACKETSTORMid:58392

Trust: 0.1

sources: VULHUB: VHN-26317 // BID: 24983 // JVNDB: JVNDB-2007-005630 // PACKETSTORM: 58392 // CNNVD: CNNVD-200708-151 // NVD: CVE-2007-2955

REFERENCES

url:http://www.symantec.com/avcenter/security/content/2007.08.09.html

Trust: 2.1

url:http://www.securityfocus.com/bid/24983

Trust: 1.7

url:http://secunia.com/secunia_research/2007-53/advisory/

Trust: 1.7

url:http://www.securitytracker.com/id?1018545

Trust: 1.7

url:http://www.securitytracker.com/id?1018546

Trust: 1.7

url:http://www.securitytracker.com/id?1018547

Trust: 1.7

url:http://secunia.com/advisories/25215

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2822

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35944

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2955

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2955

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/35944

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2822

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.symantec.com/nav/nav_9xnt/

Trust: 0.3

url:http://www.symantec.com/sabu/nis/nis_pe/

Trust: 0.3

url:http://secunia.com/secunia_research/2007-53/

Trust: 0.1

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4848/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/25215/

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-26317 // BID: 24983 // JVNDB: JVNDB-2007-005630 // PACKETSTORM: 58392 // CNNVD: CNNVD-200708-151 // NVD: CVE-2007-2955

CREDITS

Carsten Eiram

Trust: 0.6

sources: CNNVD: CNNVD-200708-151

SOURCES

db:VULHUBid:VHN-26317
db:BIDid:24983
db:JVNDBid:JVNDB-2007-005630
db:PACKETSTORMid:58392
db:CNNVDid:CNNVD-200708-151
db:NVDid:CVE-2007-2955

LAST UPDATE DATE

2024-11-23T23:06:54.816000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-26317date:2017-07-29T00:00:00
db:BIDid:24983date:2007-08-09T18:04:00
db:JVNDBid:JVNDB-2007-005630date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200708-151date:2007-08-13T00:00:00
db:NVDid:CVE-2007-2955date:2024-11-21T00:32:03.207

SOURCES RELEASE DATE

db:VULHUBid:VHN-26317date:2007-08-09T00:00:00
db:BIDid:24983date:2007-08-09T00:00:00
db:JVNDBid:JVNDB-2007-005630date:2012-12-20T00:00:00
db:PACKETSTORMid:58392date:2007-08-10T02:01:07
db:CNNVDid:CNNVD-200708-151date:2007-08-09T00:00:00
db:NVDid:CVE-2007-2955date:2007-08-09T21:17:00