ID

VAR-200804-0256


CVE

CVE-2008-0313


TITLE

Norton 360 Such as Symantec Norton Product ActiveDataInfo.LaunchProcess Vulnerability in arbitrary code execution in method

Trust: 0.8

sources: JVNDB: JVNDB-2008-005386

DESCRIPTION

The ActiveDataInfo.LaunchProcess method in the SymAData.ActiveDataInfo.1 ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, does not properly determine the location of the AutoFix Tool, which allows remote attackers to execute arbitrary code via a remote (1) WebDAV or (2) SMB share. An ActiveX control in the Symantec AutoFix Tool is prone to a vulnerability due to an insecure method. Attackers can leverage this issue to load an arbitrary file onto a victim's computer and then execute it with the privileges of the application running the control (typically Internet Explorer). This issue is exploitable only when a victim's computer is configured to allow remote connections to WebDav or SMB shares. Successful exploits will compromise affected computers. iDefense Security Advisory 04.02.08 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 02, 2008 I. BACKGROUND Norton Internet Security 2008 is a system security suite that offers protection from spyware, viruses, identity theft, spam, and malicious network traffic. More information can be found on the vendor's site at the following URL. http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008 II. III. In order for exploitation to occur, an attacker would have to lure a vulnerable user to a malicious web site. While this control is marked as safe for scripting, the control has been designed so that it can only be run from the "symantec.com" domain. In practice this requirement can be bypassed through the use of any Cross Site Scripting (XSS) vulnerabilities in the Symantec domain. Exploitation could also occur through the use of DNS poisoning attacks. IV. DETECTION iDefense confirmed that this vulnerability exists in version 2.7.0.1 of the control that is installed with the 2008 version of Norton Internet Security. Other versions may also be available. V. WORKAROUND Setting the kill-bit for this control will prevent it from being loaded within Internet Explorer. However, doing so will prevent legitimate use of the control. VI. VENDOR RESPONSE Symantec has addressed this vulnerability by releasing updates. For more information, refer to their advisory at the following URL. http://www.symantec.com/avcenter/security/Content/2008.04.02a.html VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0313 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/14/2007 Initial vendor notification 12/14/2007 Initial vendor response 04/02/2008 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. 2) A design error in the same ActiveX control can be exploited to e.g. load and execute arbitrary code from a remote share. conducts DNS poisoning or cross-site scripting attacks as the ActiveX control is site-locked and can only be scripted from a trusted domain. https://www-secure.symantec.com/techsupp/asa/install.jsp PROVIDED AND/OR DISCOVERED BY: The vendor credits Peter Vreugdenhill and an anonymous person, both reported via iDefense Labs. ORIGINAL ADVISORY: SYM08-009: http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Trust: 2.16

sources: NVD: CVE-2008-0313 // JVNDB: JVNDB-2008-005386 // BID: 28509 // VULHUB: VHN-30438 // PACKETSTORM: 65191 // PACKETSTORM: 65155

AFFECTED PRODUCTS

vendor:symantecmodel:norton 360scope:eqversion:1.0

Trust: 2.4

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.9

vendor:symantecmodel:system worksscope:eqversion:2007

Trust: 1.6

vendor:symantecmodel:system worksscope:eqversion:2008

Trust: 1.6

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:2007

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:2008

Trust: 1.6

vendor:symantecmodel:system worksscope:eqversion:2006

Trust: 1.6

vendor:symantecmodel:norton internet securityscope:eqversion:2007

Trust: 1.6

vendor:symantecmodel:norton internet securityscope:eqversion:2008

Trust: 1.6

vendor:symantecmodel:norton antivirusscope:eqversion:2006 to 2008

Trust: 0.8

vendor:symantecmodel:norton internet securityscope:eqversion:2006 to 2008

Trust: 0.8

vendor:symantecmodel:system worksscope:eqversion:2006 to 2008

Trust: 0.8

vendor:symantecmodel:norton systemworksscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:nortonscope:eqversion:3601.0

Trust: 0.3

sources: BID: 28509 // JVNDB: JVNDB-2008-005386 // CNNVD: CNNVD-200804-091 // NVD: CVE-2008-0313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0313
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0313
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200804-091
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30438
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0313
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30438
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30438 // JVNDB: JVNDB-2008-005386 // CNNVD: CNNVD-200804-091 // NVD: CVE-2008-0313

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2008-005386 // NVD: CVE-2008-0313

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 65191 // CNNVD: CNNVD-200804-091

TYPE

Design Error

Trust: 0.9

sources: BID: 28509 // CNNVD: CNNVD-200804-091

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005386

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30438

PATCH

title:SYM08-009url:http://securityresponse.symantec.com/avcenter/security/Content/2008.04.02a.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-005386

EXTERNAL IDS

db:NVDid:CVE-2008-0313

Trust: 2.9

db:BIDid:28509

Trust: 2.0

db:SECUNIAid:29660

Trust: 1.8

db:SECTRACKid:1019752

Trust: 1.7

db:SECTRACKid:1019751

Trust: 1.7

db:SECTRACKid:1019753

Trust: 1.7

db:VUPENid:ADV-2008-1077

Trust: 1.7

db:JVNDBid:JVNDB-2008-005386

Trust: 0.8

db:CNNVDid:CNNVD-200804-091

Trust: 0.7

db:XFid:41631

Trust: 0.6

db:IDEFENSEid:20080402 SYMANTEC INTERNET SECURITY 2008 ACTIVEDATAINFO.LAUNCHPROCESS DESIGN ERROR VULNERABILITY

Trust: 0.6

db:PACKETSTORMid:65191

Trust: 0.2

db:VULHUBid:VHN-30438

Trust: 0.1

db:PACKETSTORMid:65155

Trust: 0.1

sources: VULHUB: VHN-30438 // BID: 28509 // JVNDB: JVNDB-2008-005386 // PACKETSTORM: 65191 // PACKETSTORM: 65155 // CNNVD: CNNVD-200804-091 // NVD: CVE-2008-0313

REFERENCES

url:http://securityresponse.symantec.com/avcenter/security/content/2008.04.02a.html

Trust: 2.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=678

Trust: 2.0

url:http://www.securityfocus.com/bid/28509

Trust: 1.7

url:http://www.securitytracker.com/id?1019751

Trust: 1.7

url:http://www.securitytracker.com/id?1019752

Trust: 1.7

url:http://www.securitytracker.com/id?1019753

Trust: 1.7

url:http://secunia.com/advisories/29660

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1077/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41631

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0313

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0313

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41631

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1077/references

Trust: 0.6

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.symantec.com/norton/products/index.jsp

Trust: 0.3

url:/archive/1/490469

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2008-0313

Trust: 0.1

url:http://www.symantec.com/home_homeoffice/products/overview.jsp?pcid=is&pvid=nis2008

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://www.symantec.com/avcenter/security/content/2008.04.02a.html

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://secunia.com/product/6635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/16476/

Trust: 0.1

url:http://secunia.com/product/6636/

Trust: 0.1

url:http://secunia.com/product/18165/

Trust: 0.1

url:http://secunia.com/product/15952/

Trust: 0.1

url:https://www-secure.symantec.com/techsupp/asa/install.jsp

Trust: 0.1

url:http://secunia.com/product/16595/

Trust: 0.1

url:http://secunia.com/product/14022/

Trust: 0.1

url:http://secunia.com/product/18166/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/6634/

Trust: 0.1

url:http://secunia.com/product/16477/

Trust: 0.1

url:http://secunia.com/advisories/29660/

Trust: 0.1

sources: VULHUB: VHN-30438 // BID: 28509 // JVNDB: JVNDB-2008-005386 // PACKETSTORM: 65191 // PACKETSTORM: 65155 // CNNVD: CNNVD-200804-091 // NVD: CVE-2008-0313

CREDITS

Peter Vreugdenhill

Trust: 0.6

sources: CNNVD: CNNVD-200804-091

SOURCES

db:VULHUBid:VHN-30438
db:BIDid:28509
db:JVNDBid:JVNDB-2008-005386
db:PACKETSTORMid:65191
db:PACKETSTORMid:65155
db:CNNVDid:CNNVD-200804-091
db:NVDid:CVE-2008-0313

LAST UPDATE DATE

2024-11-23T22:43:13.084000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30438date:2017-08-08T00:00:00
db:BIDid:28509date:2008-04-04T18:59:00
db:JVNDBid:JVNDB-2008-005386date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200804-091date:2008-11-19T00:00:00
db:NVDid:CVE-2008-0313date:2024-11-21T00:41:39.137

SOURCES RELEASE DATE

db:VULHUBid:VHN-30438date:2008-04-08T00:00:00
db:BIDid:28509date:2008-04-02T00:00:00
db:JVNDBid:JVNDB-2008-005386date:2012-12-20T00:00:00
db:PACKETSTORMid:65191date:2008-04-04T22:56:33
db:PACKETSTORMid:65155date:2008-04-04T20:56:23
db:CNNVDid:CNNVD-200804-091date:2008-04-08T00:00:00
db:NVDid:CVE-2008-0313date:2008-04-08T17:05:00