Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Norton Insufficient validation of 'SymTDI' driver input buffer
From: Matousec - Transparent security Research <research () matousec com>
Date: Thu, 15 Mar 2007 13:06:43 +0100


We would like to inform you about a vulnerability in Symantec Norton products.


Norton insufficiently protects its driver \Device\SymEvent against a manipulation by malicious applications and it 
to validate its input buffer. It is possible to open this driver and send arbitrary data to it, which are implicitly 
believed to be valid. It is possible to assemble the data in the input buffer such that the driver performs an invalid 
memory operation and crashes the whole operating system. Further impacts of this bug (like possibility of arbitrary 
execution in the kernel mode) were not examined.

Vulnerable software:

     * Norton Personal Firewall 2006 version
     * Norton Personal Firewall 2006 version
     * probably all versions of Norton Personal Firewall 2006, Norton Internet Security 2006 and other products that 
SymTDI driver
     * possibly older versions of Norton Personal Firewall and Norton Internet Security

More details and a proof of concept including its source code are available here:


Matousec - Transparent security Research

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
  • Norton Insufficient validation of 'SymTDI' driver input buffer Matousec - Transparent security Research (Mar 15)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]