ID

VAR-200804-0255


CVE

CVE-2008-0312


TITLE

Norton 360 Such as Symantec Norton Product AutoFix Support Tool ActiveX Stack-based buffer overflow vulnerability in Control

Trust: 0.8

sources: JVNDB: JVNDB-2008-005385

DESCRIPTION

Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information. Symantec AutoFix Support Tool ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. NOTE: To exploit this issue, an attacker must entice an unsuspecting victim to to visit a malicious website masquerading as a trusted Symantec site. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. 2) A design error in the same ActiveX control can be exploited to e.g. load and execute arbitrary code from a remote share. conducts DNS poisoning or cross-site scripting attacks as the ActiveX control is site-locked and can only be scripted from a trusted domain. https://www-secure.symantec.com/techsupp/asa/install.jsp PROVIDED AND/OR DISCOVERED BY: The vendor credits Peter Vreugdenhill and an anonymous person, both reported via iDefense Labs. ORIGINAL ADVISORY: SYM08-009: http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. iDefense Security Advisory 04.02.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 02, 2008 I. BACKGROUND Norton Internet Security 2008 is a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic. More information can be found on the vendor's site at the following URL. http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008 II. III. In order for exploitation to occur, an attacker would have to lure a vulnerable user to a malicious web site. While this control is marked as safe for scripting, the control has been designed so that it can only be run from the "symantec.com" domain. In practice this requirement can be bypassed through the use of any Cross Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation could also occur through the use of DNS poisoning attacks. IV. DETECTION iDefense confirmed that this vulnerability exists in version 2.7.0.1 of the control that is installed with the 2008 version of Norton Internet Security. Other versions may also be available. V. WORKAROUND Setting the kill-bit for this control will prevent it from being loaded within Internet Explorer. However, doing so will prevent legitimate use of the control. VI. VENDOR RESPONSE Symantec has addressed this vulnerability by releasing updates. For more information, refer to their advisory at the following URL. http://www.symantec.com/avcenter/security/Content/2008.04.02a.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0312 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/05/2007 Initial vendor notification 12/05/2007 Initial vendor response 04/02/2008 Coordinated public disclosure IX. CREDIT This vulnerability was reported to iDefense by Peter Vreugdenhil. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Trust: 2.16

sources: NVD: CVE-2008-0312 // JVNDB: JVNDB-2008-005385 // BID: 28507 // VULHUB: VHN-30437 // PACKETSTORM: 65155 // PACKETSTORM: 65190

AFFECTED PRODUCTS

vendor:symantecmodel:norton 360scope:eqversion:1.0

Trust: 1.8

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.3

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 1.0

vendor:symantecmodel:norton system worksscope:eqversion:2007

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.0

vendor:symantecmodel:norton system worksscope:eqversion:2008

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2007

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2008

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:2007

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:2008

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:2006 to 2008

Trust: 0.8

vendor:symantecmodel:norton internet securityscope:eqversion:2006 to 2008

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:2006 to 2008

Trust: 0.8

vendor:microsoftmodel:windowsscope: - version: -

Trust: 0.6

vendor:symantecmodel:norton systemworksscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:nortonscope:eqversion:3601.0

Trust: 0.3

sources: BID: 28507 // JVNDB: JVNDB-2008-005385 // CNNVD: CNNVD-200804-090 // NVD: CVE-2008-0312

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0312
value: HIGH

Trust: 1.0

NVD: CVE-2008-0312
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200804-090
value: CRITICAL

Trust: 0.6

VULHUB: VHN-30437
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-0312
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30437
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30437 // JVNDB: JVNDB-2008-005385 // CNNVD: CNNVD-200804-090 // NVD: CVE-2008-0312

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-30437 // JVNDB: JVNDB-2008-005385 // NVD: CVE-2008-0312

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 65190 // CNNVD: CNNVD-200804-090

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200804-090

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005385

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30437

PATCH

title:SYM08-009url:http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-005385

EXTERNAL IDS

db:NVDid:CVE-2008-0312

Trust: 2.9

db:BIDid:28507

Trust: 2.0

db:SECUNIAid:29660

Trust: 1.8

db:SECTRACKid:1019752

Trust: 1.7

db:SECTRACKid:1019751

Trust: 1.7

db:SECTRACKid:1019753

Trust: 1.7

db:VUPENid:ADV-2008-1077

Trust: 1.7

db:JVNDBid:JVNDB-2008-005385

Trust: 0.8

db:CNNVDid:CNNVD-200804-090

Trust: 0.7

db:IDEFENSEid:20080402 SYMANTEC NORTON INTERNET SECURITY 2008 ACTIVEX CONTROL BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:65190

Trust: 0.2

db:VULHUBid:VHN-30437

Trust: 0.1

db:PACKETSTORMid:65155

Trust: 0.1

sources: VULHUB: VHN-30437 // BID: 28507 // JVNDB: JVNDB-2008-005385 // PACKETSTORM: 65155 // PACKETSTORM: 65190 // CNNVD: CNNVD-200804-090 // NVD: CVE-2008-0312

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2008.04.02a.html

Trust: 2.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=677

Trust: 2.0

url:http://www.securityfocus.com/bid/28507

Trust: 1.7

url:http://www.securitytracker.com/id?1019751

Trust: 1.7

url:http://www.securitytracker.com/id?1019752

Trust: 1.7

url:http://www.securitytracker.com/id?1019753

Trust: 1.7

url:http://secunia.com/advisories/29660

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1077/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41629

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0312

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0312

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1077/references

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.symantec.com/norton/products/index.jsp

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:/archive/1/490471

Trust: 0.3

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/16476/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/product/18165/

Trust: 0.1

url:http://secunia.com/product/15952/

Trust: 0.1

url:https://www-secure.symantec.com/techsupp/asa/install.jsp

Trust: 0.1

url:http://secunia.com/product/16595/

Trust: 0.1

url:http://secunia.com/product/14022/

Trust: 0.1

url:http://secunia.com/product/18166/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/product/16477/

Trust: 0.1

url:http://secunia.com/advisories/29660/

Trust: 0.1

url:http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://www.symantec.com/avcenter/security/content/2008.04.02a.html

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0312

Trust: 0.1

sources: VULHUB: VHN-30437 // BID: 28507 // JVNDB: JVNDB-2008-005385 // PACKETSTORM: 65155 // PACKETSTORM: 65190 // CNNVD: CNNVD-200804-090 // NVD: CVE-2008-0312

CREDITS

Peter Vreugdenhill

Trust: 0.9

sources: BID: 28507 // CNNVD: CNNVD-200804-090

SOURCES

db:VULHUBid:VHN-30437
db:BIDid:28507
db:JVNDBid:JVNDB-2008-005385
db:PACKETSTORMid:65155
db:PACKETSTORMid:65190
db:CNNVDid:CNNVD-200804-090
db:NVDid:CVE-2008-0312

LAST UPDATE DATE

2024-11-23T22:43:13.131000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30437date:2017-08-08T00:00:00
db:BIDid:28507date:2008-04-04T18:59:00
db:JVNDBid:JVNDB-2008-005385date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200804-090date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0312date:2024-11-21T00:41:38.980

SOURCES RELEASE DATE

db:VULHUBid:VHN-30437date:2008-04-08T00:00:00
db:BIDid:28507date:2008-04-02T00:00:00
db:JVNDBid:JVNDB-2008-005385date:2012-12-20T00:00:00
db:PACKETSTORMid:65155date:2008-04-04T20:56:23
db:PACKETSTORMid:65190date:2008-04-04T22:55:41
db:CNNVDid:CNNVD-200804-090date:2008-04-08T00:00:00
db:NVDid:CVE-2008-0312date:2008-04-08T17:05:00