var-200703-0519
Vulnerability from variot
The \Device\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.1.7, and possibly other products using symevent.sys 12.0.0.20, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data, a reintroduction of CVE-2006-4855. This vulnerability CVE-2006-4855 It is a reproduction.Local user disrupts service operation via invalid data ( System crash ) It may be in a state. This issue occurs when attackers send malformed data to the 'SymEvent' driver. A local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec is currently investigating this issue; this BID will be updated as more information becomes available. NOTE: This BID is being retired because it is already covered in BID 20051. Please see the vulnerable systems section for details regarding affected Symantec products. This vulnerability is a re-reference of CVE-2006-4855
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0519", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "norton personal firewall", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "2006_9.1.1.7" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "2006 9.1.1.7" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20069.1.1.7" }, { "model": "pcanywhere", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11.5" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20060" }, { "model": "norton systemworks premier", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20050" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton systemworks professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton personal firewall", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton internet security professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton internet security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20070" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2006" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2005" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2004" }, { "model": "norton antivirus professional edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2003" }, { "model": "norton antivirus", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "20030" }, { "model": "host ids", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.0" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.51100" }, { "model": "client security mr3 b9.0.3.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.3" }, { "model": "client security mr2 b9.0.2.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.2" }, { "model": "client security mr1 b9.0.1.1000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0.1" }, { "model": "client security stm build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.09.0.0.338" }, { "model": "client security (scf", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.07.1)" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.0" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.336" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.329" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.323" }, { "model": "client security mr2 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.18.1.1.319" }, { "model": "client security mr1 build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1393" }, { "model": "client security mr6 b8.1.1.266", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1.1" }, { "model": "client security stm b8.1.0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.1" }, { "model": "client security mr8 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.471" }, { "model": "client security mr7 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.464" }, { "model": "client security mr6 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.460" }, { "model": "client security mr5 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.457" }, { "model": "client security mr4 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.446" }, { "model": "client security mr3 build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.434" }, { "model": "client security build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.18.01.437" }, { "model": "client security mr9 b8.01.501", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr2 b8.01.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security mr1 b8.01.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.1" }, { "model": "client security b8.01.9378", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0.0" }, { "model": "client security b8.01.9374", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "1.0" }, { "model": "client security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "3.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2021" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2020" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2011" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2010" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2002" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2001" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2.2000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5.1100" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.5" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.4" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1.1.1000" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.0.338" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.329" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.323" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.18.1.1.319" }, { "model": "antivirus corporate edition build 8.1.1.314a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1393" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.377" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1.366" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.471" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.464" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.460" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.457" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.446" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.437" }, { "model": "antivirus corporate edition build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.18.01.434" }, { "model": "antivirus corporate edition .0.825a", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9378" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.9374" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01.501" }, { "model": "antivirus corporate edition 1.429c", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition 1.425a/b", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.01" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "antivirus corporate edition", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" } ], "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:symantec:norton_personal_firewall", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovery is credited to David Matousek.", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "CNNVD", "id": "CNNVD-200703-422" } ], "trust": 1.2 }, "cve": "CVE-2007-1495", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2007-1495", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-24857", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-1495", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2007-1495", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200703-422", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-24857", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The \\Device\\SymEvent driver in Symantec Norton Personal Firewall 2006 9.1.1.7, and possibly other products using symevent.sys 12.0.0.20, allows local users to cause a denial of service (system crash) via invalid data, as demonstrated by calling DeviceIoControl to send the data, a reintroduction of CVE-2006-4855. This vulnerability CVE-2006-4855 It is a reproduction.Local user disrupts service operation via invalid data ( System crash ) It may be in a state. This issue occurs when attackers send malformed data to the \u0027SymEvent\u0027 driver. \nA local authenticated attacker may exploit this issue to crash affected computers, denying service to legitimate users. Symantec is currently investigating this issue; this BID will be updated as more information becomes available. \nNOTE: This BID is being retired because it is already covered in BID 20051. \nPlease see the vulnerable systems section for details regarding affected Symantec products. This vulnerability is a re-reference of CVE-2006-4855", "sources": [ { "db": "NVD", "id": "CVE-2007-1495" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "VULHUB", "id": "VHN-24857" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1495", "trust": 2.8 }, { "db": "BID", "id": "22961", "trust": 2.0 }, { "db": "SREASON", "id": "2445", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-005254", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200703-422", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20070314 SYMEVENT DRIVER LOCAL ACCESS SYSTEM DENIAL OF SERVICE", "trust": 0.6 }, { "db": "BID", "id": "20051", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-24857", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "id": "VAR-200703-0519", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24857" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:28:25.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Norton Personal Firewall", "trust": 0.8, "url": "http://us.norton.com/now/en/pu/images/Promotions/2012/5804/ch2.html?undefined\u0026s_tnt=48837:19:0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-1495" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/22961" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/2445" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/462792/100/0/threaded" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1495" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1495" }, { "trust": 0.6, "url": "http://www.symantec.com/sabu/nis/npf/" }, { "trust": 0.6, "url": "/archive/1/446111" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/462792/100/0/threaded" }, { "trust": 0.3, "url": "/archive/1/462792" }, { "trust": 0.3, "url": "http://www.symantec.com/avcenter/security/content/2006.09.20a.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-24857" }, { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "db": "CNNVD", "id": "CNNVD-200703-422" }, { "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-16T00:00:00", "db": "VULHUB", "id": "VHN-24857" }, { "date": "2007-03-14T00:00:00", "db": "BID", "id": "22961" }, { "date": "2006-09-15T00:00:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "date": "2007-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-422" }, { "date": "2007-03-16T22:19:00", "db": "NVD", "id": "CVE-2007-1495" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-24857" }, { "date": "2007-07-03T22:17:00", "db": "BID", "id": "22961" }, { "date": "2015-05-12T19:49:00", "db": "BID", "id": "20051" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-005254" }, { "date": "2007-03-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-422" }, { "date": "2024-11-21T00:28:27.257000", "db": "NVD", "id": "CVE-2007-1495" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" }, { "db": "CNNVD", "id": "CNNVD-200703-422" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Norton Personal Firewall Such as \\Device\\SymEvent Service disruption in drivers (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-005254" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "22961" }, { "db": "BID", "id": "20051" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.