ID

VAR-201002-0080


CVE

CVE-2010-0107


TITLE

Symantec N360 Such as SYMLTCOM.dll Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2010-005201

DESCRIPTION

Buffer overflow in an ActiveX control (SYMLTCOM.dll) in Symantec N360 1.0 and 2.0; Norton Internet Security, AntiVirus, SystemWorks, and Confidential 2006 through 2008; and Symantec Client Security 3.0.x before 3.1 MR9, and 3.1.x before MR9; allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. NOTE: this is only a vulnerability if the attacker can "masquerade as an authorized site.". Multiple Symantec products are prone to a stack-based buffer-overflow vulnerability because the applications utilize an ActiveX control that fails to adequately validate user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. Remote Attacker An attacker can pass an unidentified vector, causing a denial of service. ---------------------------------------------------------------------- Public Beta of CSI and WSUS Integration http://secunia.com/blog/74 ---------------------------------------------------------------------- TITLE: Symantec Products "SYMLTCOM.dll" ActiveX Control Buffer Overflow SECUNIA ADVISORY ID: SA38654 VERIFY ADVISORY: http://secunia.com/advisories/38654/ DESCRIPTION: A vulnerability has been reported in some Symantec products, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an input validation error in the SYMLTCOM.dll ActiveX control, which can be exploited to cause e.g. a stack-based buffer overflow when a user visits a specially crafted web page. Successful exploitation allows execution of arbitrary code, but is limited to a certain unspecified domain. Symantec Client Security 3.0.x: Update to SCS 3.1 MR9. Symantec Client Security 3.1.x: Update to MR9. PROVIDED AND/OR DISCOVERED BY: The vendor credits FrSIRT. ORIGINAL ADVISORY: Symantec SYM10-003: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . VUPEN Security Research - Symantec Products "SYMLTCOM.dll" Buffer Overflow Vulnerability http://www.vupen.com/english/research.php I. DESCRIPTION --------------------- VUPEN Vulnerability Research Team discovered a vulnerability in various Symantec security products. II. CREDIT -------------- The vulnerabilities were discovered by VUPEN Security V. ABOUT VUPEN Security --------------------------------- VUPEN is a leading IT security research company providing vulnerability management services to allow enterprises and organizations to eliminate vulnerabilities before they can be exploited, ensure security policy compliance and meaningfully measure and manage risks. VUPEN also provides research services for security vendors (antivirus, IDS, IPS,etc) to supplement their internal vulnerability research efforts and quickly develop vulnerability-based and exploit-based signatures, rules, and filters, and proactively protect their customers against potential threats. * VUPEN Vulnerability Notification Service: http://www.vupen.com/english/services * VUPEN Exploits and In-Depth Vulnerability Analysis: http://www.vupen.com/exploits VI. REFERENCES ---------------------- http://www.vupen.com/english/advisories/2010/0411 http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0107 VII. DISCLOSURE TIMELINE ----------------------------------- 2008-04-07 - Vendor notified 2008-04-08 - Vendor response 2008-05-09 - Status update received 2008-06-10 - Status update received 2008-12-05 - Status update received 2010-02-18 - Patches available, public disclosure

Trust: 2.16

sources: NVD: CVE-2010-0107 // JVNDB: JVNDB-2010-005201 // BID: 38217 // VULHUB: VHN-42712 // PACKETSTORM: 86447 // PACKETSTORM: 86693

AFFECTED PRODUCTS

vendor:symantecmodel:client securityscope:eqversion:3.1

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.400

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.401

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.0

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.396

Trust: 1.9

vendor:symantecmodel:client securityscope:eqversion:3.1.0.396

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:3.1.0.401

Trust: 1.6

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1008

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2000

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1009

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1000

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2020

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2010

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2001

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1007

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1001

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2011

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2021

Trust: 1.3

vendor:symantecmodel:norton antivirusscope:eqversion:2006

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2.2002

Trust: 1.3

vendor:symantecmodel:client securityscope:eqversion:3.0.2

Trust: 1.0

vendor:symantecmodel:norton 360scope:eqversion:1.0

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2006

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2007

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:2007

Trust: 1.0

vendor:symantecmodel:norton antivirusscope:eqversion:2008

Trust: 1.0

vendor:symantecmodel:norton internet securityscope:eqversion:2008

Trust: 1.0

vendor:symantecmodel:norton 360scope:eqversion:2.0

Trust: 1.0

vendor:symantecmodel:client securityscope:ltversion:3.1 mr9

Trust: 0.8

vendor:symantecmodel:norton 360scope:eqversion:1.0 2.0

Trust: 0.8

vendor:symantecmodel:norton antivirusscope: - version: -

Trust: 0.8

vendor:symantecmodel:norton internet securityscope: - version: -

Trust: 0.8

vendor:symantecmodel:client securityscope:eqversion:3.1.6.6000

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton internet security professional editionscope:eqversion:2006

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.5.5010

Trust: 0.3

vendor:symantecmodel:norton confidentialscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.6.6010

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.7.7000

Trust: 0.3

vendor:symantecmodel:norton confidentialscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:client security mr6scope:eqversion:3.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.1.1003

Trust: 0.3

vendor:symantecmodel:norton system worksscope:eqversion:2006

Trust: 0.3

vendor:symantecmodel:norton confidentialscope:eqversion:20060

Trust: 0.3

vendor:symantecmodel:norton systemworks premierscope:eqversion:20050

Trust: 0.3

vendor:symantecmodel:nortonscope:eqversion:3602.0

Trust: 0.3

vendor:symantecmodel:client security mr4 mp1 buildscope:eqversion:3.1.4-4010

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.394

Trust: 0.3

vendor:symantecmodel:client security mr8scope:eqversion:3.1

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.0.0.359

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.5.5000

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.4.4000

Trust: 0.3

vendor:symantecmodel:client securityscope:eqversion:3.1.5.5001

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:nortonscope:eqversion:3601.0

Trust: 0.3

vendor:symantecmodel:client security mr7scope:eqversion:3.1

Trust: 0.3

vendor:symantecmodel:client security mr9scope:neversion:3.1

Trust: 0.3

vendor:symantecmodel:norton antivirusscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton systemworksscope:eqversion:20080

Trust: 0.3

vendor:symantecmodel:norton internet securityscope:eqversion:20070

Trust: 0.3

vendor:symantecmodel:client security mr6 mp1scope:eqversion:3.1

Trust: 0.3

sources: BID: 38217 // JVNDB: JVNDB-2010-005201 // CNNVD: CNNVD-201002-232 // NVD: CVE-2010-0107

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0107
value: HIGH

Trust: 1.0

NVD: CVE-2010-0107
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201002-232
value: CRITICAL

Trust: 0.6

VULHUB: VHN-42712
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-0107
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42712
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42712 // JVNDB: JVNDB-2010-005201 // CNNVD: CNNVD-201002-232 // NVD: CVE-2010-0107

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-42712 // JVNDB: JVNDB-2010-005201 // NVD: CVE-2010-0107

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 86693 // CNNVD: CNNVD-201002-232

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201002-232

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005201

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-42712

PATCH

title:SYM10-003url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01

Trust: 0.8

sources: JVNDB: JVNDB-2010-005201

EXTERNAL IDS

db:NVDid:CVE-2010-0107

Trust: 2.9

db:BIDid:38217

Trust: 2.0

db:VUPENid:ADV-2010-0411

Trust: 1.8

db:SECUNIAid:38654

Trust: 1.8

db:SECTRACKid:1023628

Trust: 1.7

db:SECTRACKid:1023631

Trust: 1.7

db:SECTRACKid:1023630

Trust: 1.7

db:SECTRACKid:1023629

Trust: 1.7

db:OSVDBid:62412

Trust: 1.7

db:JVNDBid:JVNDB-2010-005201

Trust: 0.8

db:CNNVDid:CNNVD-201002-232

Trust: 0.7

db:XFid:56357

Trust: 0.6

db:PACKETSTORMid:86693

Trust: 0.2

db:VULHUBid:VHN-42712

Trust: 0.1

db:PACKETSTORMid:86447

Trust: 0.1

sources: VULHUB: VHN-42712 // BID: 38217 // JVNDB: JVNDB-2010-005201 // PACKETSTORM: 86447 // PACKETSTORM: 86693 // CNNVD: CNNVD-201002-232 // NVD: CVE-2010-0107

REFERENCES

url:http://www.vupen.com/english/advisories/2010/0411

Trust: 1.8

url:http://www.securityfocus.com/bid/38217

Trust: 1.7

url:http://osvdb.org/62412

Trust: 1.7

url:http://www.securitytracker.com/id?1023628

Trust: 1.7

url:http://www.securitytracker.com/id?1023629

Trust: 1.7

url:http://www.securitytracker.com/id?1023630

Trust: 1.7

url:http://www.securitytracker.com/id?1023631

Trust: 1.7

url:http://secunia.com/advisories/38654

Trust: 1.7

url:http://www.securityfocus.com/archive/1/509717/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/56357

Trust: 1.1

url:http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01

Trust: 1.1

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0107

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0107

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/56357

Trust: 0.6

url:https://www.f-secure.com

Trust: 0.3

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01

Trust: 0.1

url:http://secunia.com/advisories/38654/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/74

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.vupen.com/english/research.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0107

Trust: 0.1

url:http://www.vupen.com/exploits

Trust: 0.1

url:http://www.vupen.com/english/services

Trust: 0.1

sources: VULHUB: VHN-42712 // BID: 38217 // JVNDB: JVNDB-2010-005201 // PACKETSTORM: 86447 // PACKETSTORM: 86693 // CNNVD: CNNVD-201002-232 // NVD: CVE-2010-0107

CREDITS

FrSIRT

Trust: 0.3

sources: BID: 38217

SOURCES

db:VULHUBid:VHN-42712
db:BIDid:38217
db:JVNDBid:JVNDB-2010-005201
db:PACKETSTORMid:86447
db:PACKETSTORMid:86693
db:CNNVDid:CNNVD-201002-232
db:NVDid:CVE-2010-0107

LAST UPDATE DATE

2024-11-23T22:53:42.892000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42712date:2018-10-10T00:00:00
db:BIDid:38217date:2010-02-17T00:00:00
db:JVNDBid:JVNDB-2010-005201date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201002-232date:2010-02-24T00:00:00
db:NVDid:CVE-2010-0107date:2024-11-21T01:11:32.740

SOURCES RELEASE DATE

db:VULHUBid:VHN-42712date:2010-02-23T00:00:00
db:BIDid:38217date:2010-02-17T00:00:00
db:JVNDBid:JVNDB-2010-005201date:2012-12-20T00:00:00
db:PACKETSTORMid:86447date:2010-02-18T17:45:10
db:PACKETSTORMid:86693date:2010-02-25T06:29:19
db:CNNVDid:CNNVD-201002-232date:2010-02-23T00:00:00
db:NVDid:CVE-2010-0107date:2010-02-23T20:30:00.467