安全研究
安全漏洞
Symantec Client Firewall DNS应答远程缓冲区溢出漏洞
发布日期:2004-05-12
更新日期:2004-05-19
受影响系统:Symantec Norton Personal Firewall 2004
Symantec Norton Personal Firewall 2003
Symantec Norton Internet Security 2004 Professional Edition
Symantec Norton Internet Security 2004
Symantec Norton Internet Security 2003 Professional Edition
Symantec Norton AntiSpam 2004
Symantec Client Firewall 5.1.1
Symantec Client Firewall 5.0.1
Symantec Client Security 2.0 (SCF 7.1)
Symantec Client Security 1.1
Symantec Client Security 1.0
Symantec Norton Internet Security 2003
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows ME
- Microsoft Windows 98 SE
- Microsoft Windows 98
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
描述:
BUGTRAQ ID:
10334
CVE(CAN) ID:
CVE-2004-0444
Symantec Client Firewall是适用与Windows的桌面防火墙。
Symantec Client Firewall对DNS应答数据缺少充分边界检查,远程攻击者可以利用这个漏洞对防火墙进行缓冲区溢出攻击,可能以SYSTEM进程权限在系统上执行任意指令。
SYMDNS.SYS驱动的产品在允许通过防火墙前会验证每个DNS应答包,在重组DNS Answer.Name时对外部提供的数据缺少充分边界缓冲区检查,攻击者可以构建恶意DNS应答数据到受此漏洞影响的UDP 53端口,可发生拒绝服务攻击。存在执行任意指令的可能。
其他如orton Internet Security, Norton Personal Firewall, Norton AntiSpam, Client Firewall,和Client Security也存在此漏洞。
<*来源:Eeye Digital Security
链接:
http://www.eeye.com/html/Research/Advisories/AD20040512B.html
http://securityresponse.symantec.com/avcenter/security/Content/2004.05.12.html
*>
建议:
厂商补丁:
Symantec
--------
目前厂商已经发布了升级补丁以修复这个安全问题,用户可以使用Symantec LiveUpdate进行升级。
http://www.symantec.com/浏览次数:7344
严重程度:2(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载 绿盟科技给您安全的保障 |