mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
4.5 KiB
JSON
138 lines
4.5 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-4855",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.0.33, and other versions of Norton Personal Firewall, Internet Security, AntiVirus, SystemWorks, Symantec Client Security SCS 1.x, 2.x, 3.0, and 3.1, Symantec AntiVirus Corporate Edition SAVCE 8.x, 9.x, 10.0, and 10.1, Symantec pcAnywhere 11.5 only, and Symantec Host, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060915 Symantec Norton Insufficient validation of 'SymEvent' driver input buffer",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/446111/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.matousec.com/info/advisories/Norton-Insufficient-validation-of-SymEvent-driver-input-buffer.php"
|
|
},
|
|
{
|
|
"name" : "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://securityresponse.symantec.com/avcenter/security/Content/2006.09.20a.html"
|
|
},
|
|
{
|
|
"name" : "20051",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/20051"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-3636",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/3636"
|
|
},
|
|
{
|
|
"name" : "1016889",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016889"
|
|
},
|
|
{
|
|
"name" : "1016892",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016892"
|
|
},
|
|
{
|
|
"name" : "1016893",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016893"
|
|
},
|
|
{
|
|
"name" : "1016894",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016894"
|
|
},
|
|
{
|
|
"name" : "1016895",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016895"
|
|
},
|
|
{
|
|
"name" : "1016896",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016896"
|
|
},
|
|
{
|
|
"name" : "1016897",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016897"
|
|
},
|
|
{
|
|
"name" : "1016898",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016898"
|
|
},
|
|
{
|
|
"name" : "21938",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/21938"
|
|
},
|
|
{
|
|
"name" : "1591",
|
|
"refsource" : "SREASON",
|
|
"url" : "http://securityreason.com/securityalert/1591"
|
|
},
|
|
{
|
|
"name" : "symantec-firewall-symevent-dos(28960)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28960"
|
|
}
|
|
]
|
|
}
|
|
}
|