UGN Security Forums
My ProfileMember DirectoryLogin
Search our ForumsView our FAQView our Site Rules
View our CalendarView our Active TopicsGo to our Main Page

UGN Security Store
 

Network Sites UGN Security, The GoNix Initiative, Elite Web Gamers, Back of the Web, EveryDay Helper, VNC Web Design & Development
January
Su M Tu W Th F Sa
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Sponsored Links
Latest Postings
也是福运似海、福运宏达的精神之源和力量之

by lmnopq127978
Today at 03:01 AM
饱餐大食
by lmnopq127978
Today at 03:00 AM
尊重任何人的选择
by lmnopq127978
Today at 03:00 AM
一直演进到篆书金文
by lmnopq127978
Today at 02:59 AM
里相思朋辈远
by lmnopq127978
Today at 02:59 AM
谁欠了谁一生的情
by lmnopq127978
Today at 02:58 AM
谁人之痛
by lmnopq127978
Today at 02:57 AM
【煦色韶华问佛】
by lmnopq127978
Yesterday at 03:38 AM
【听,梦里雪落的声音】
by lmnopq127978
Yesterday at 03:37 AM
那天,她留下了眼泪
by lmnopq127978
01/26/15 04:09 AM
Latest Reviews
Topic Options
Rate This Topic
#2671 - 05/13/04 10:13 PM Good thing I use a firewall to protect me from hackers!
Chem Offline
UGN News Staff

Registered: 10/13/02
Posts: 364
Loc: Vagabond (Location Differs)
Quote:
Symantec Multiple Firewall Remote DNS KERNEL Overflow

Release Date:
May 12, 2004

Date Reported:
April 19, 2004

Severity:
High (Remote Kernel Access)

Vendor:
Symantec

Systems Affected:
Symantec Norton Internet Security 2002
Symantec Norton Internet Security 2003
Symantec Norton Internet Security 2004
Symantec Norton Internet Security Professional 2002
Symantec Norton Internet Security Professional 2003
Symantec Norton Internet Security Professional 2004
Symantec Norton Personal Firewall 2002
Symantec Norton Personal Firewall 2003
Symantec Norton Personal Firewall 2004
Symantec Client Firewall 5.01, 5.1.1
Symantec Client Security 1.0, 1.1, 2.0(SCF 7.1)
Symantec Norton AntiSpam 2004

Description:
eEye Digital Security has discovered a critical remote vulnerability
within the Symantec firewall product line. A buffer overflow exists
within a core driver component that handles the processing of DNS
(Domain Name Service) requests and responses. By sending a DNS Resource
Record with an overly long canonical name, a traditional stack-based
buffer overflow is triggered. Successful exploitation of this flaw
yields remote KERNEL access to the system.

With the ability to freely execute code at the Ring 0 privilege level,
there are literally no boundaries for an attacker.

It should also be noted, that due to a separate design flaw in the
firewalls handling of incoming packets, this attack can be successfully
performed with all ports filtered, and all intrusion rules set.
AHHAHAHA Oh shit.

Source
_________________________
C++ Should Have Been Called "D"

Top
Sponsored Links
      
#2672 - 05/14/04 12:22 AM Re: Good thing I use a firewall to protect me from hackers!
Gremelin Offline

Community Owner
*****

Registered: 02/28/02
Posts: 7193
Loc: Portland, OR; USA
Thank god i knew norton sucked...
_________________________
Donate to UGN Security here.
UGN Security, Back of the Web, Elite Web Gamers & VNC Web Design Owner

Top
#2673 - 05/22/04 08:47 AM Re: Good thing I use a firewall to protect me from hackers!
Red Mage Offline
Member

Registered: 10/24/03
Posts: 209
Loc: here.
Bah.. I don't like Norton, it wastes memory. Try AVG and stuff.. :p
_________________________
Those who say do not know.
Those who know do not say.

Top

Moderator:  Infinite 
Featured Member
Registered: 10/28/14
Posts: 1
Forum Stats
2153 Members
46 Forums
36677 Topics
71847 Posts

Max Online: 1567 @ 04/25/10 05:20 AM
Top Posters
UGN Security 29823
Gremelin 7193
§intå× 3255
SilentRage 1273
Ice 1146
pergesu 1136
Infinite 1041
jonconley 955
Girlie 908
unreal 860
Newest Members
claralobo, cdefgh368568, HushHush, golqm, Tim050
2152 Registered Users
Who's Online
1 registered (lmnopq127978), 220 Guests and 198 Spiders online.
Key: Admin, Global Mod, Mod
Latest News


Donate
  Get Firefox!
Get FireFox!