CVE-2004-0444

N/A Unknown
Published: July 07, 2004 Modified: April 16, 2026
View on NVD

Description

Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professional 2002 through 2004, Norton Personal Firewall 2002 through 2004, Norton AntiSpam 2004, Client Firewall 5.01 and 5.1.1, and Client Security 1.0 through 2.0 allow remote attackers to cause a denial of service or execute arbitrary code via (1) a manipulated length byte in the first-level decoding routine for NetBIOS Name Service (NBNS) that modifies an index variable and leads to a stack-based buffer overflow, (2) a heap-based corruption problem in an NBNS response that is missing certain RR fields, and (3) a stack-based buffer overflow in the DNS component via a Resource Record (RR) with a long canonical name (CNAME) field composed of many smaller components.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/294998
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/634414
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/637318
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/6099
Source: cve@mitre.org
http://www.osvdb.org/6101
Source: cve@mitre.org
http://www.osvdb.org/6102
Source: cve@mitre.org
http://secunia.com/advisories/11066
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1010144
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1010145
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1010146
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ciac.org/ciac/bulletins/o-141.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/294998
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/634414
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/637318
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/6099
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/6101
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/6102
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/10333
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/10334
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/10335
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/16134
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/16135
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/16137
Source: af854a3a-2127-422b-91ae-364da2661108

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
62.8%
98th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

symantec