CVE-2005-0249

Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:symantec:antivirus_scan_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:symantec:brightmail_antispam:4.0:*:*:*:*:*:*:*
cpe:2.3:a:symantec:brightmail_antispam:5.5:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*
cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*
cpe:2.3:a:symantec:gateway_security:1.0:*:*:*:*:*:*:*
cpe:2.3:a:symantec:gateway_security:2.0:*:*:*:*:*:*:*
cpe:2.3:a:symantec:gateway_security:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:4.0:*:domino:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:4.1:build_458:exchange:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:4.1:build_459:exchange:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:4.1:build_461:exchange:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:4.5_build_719:*:exchange:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:2.18_build_83:*:exchange:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.434:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.437:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.446:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.457:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.460:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.464:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:8.01.471:*:corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:9.0:*:macintosh_corporate:*:*:*:*:*
cpe:2.3:a:symantec:norton_antivirus:2004:*:windows:*:*:*:*:*
cpe:2.3:a:symantec:norton_internet_security:2004:*:professional:*:*:*:*:*
cpe:2.3:a:symantec:norton_system_works:2004:*:windows:*:*:*:*:*
cpe:2.3:a:symantec:sav_filter_domino_nt_ports:build3.0.5:*:aix:*:*:*:*:*
cpe:2.3:a:symantec:sav_filter_domino_nt_ports:build3.0.5:*:os_400:*:*:*:*:*
cpe:2.3:a:symantec:sav_filter_for_domino_nt:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.59:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.60:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.61:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.62:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.63:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.67:*:*:*:*:*:*:*
cpe:2.3:a:symantec:web_security:3.01.68:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://securitytracker.com/id?1013133 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1013133 - Third Party Advisory, VDB Entry
References () http://www.kb.cert.org/vuls/id/107822 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/107822 - Patch, Third Party Advisory, US Government Resource
References () http://www.symantec.com/avcenter/security/Content/2005.02.08.html - Patch, Vendor Advisory () http://www.symantec.com/avcenter/security/Content/2005.02.08.html - Patch, Vendor Advisory
References () http://xforce.iss.net/xforce/alerts/id/187 - Patch, Vendor Advisory () http://xforce.iss.net/xforce/alerts/id/187 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 - VDB Entry

Information

Published : 2005-02-08 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0249

Mitre link : CVE-2005-0249

CVE.ORG link : CVE-2005-0249


JSON object : View

Products Affected

symantec

  • antivirus_scan_engine
  • brightmail_antispam
  • web_security
  • mail_security
  • sav_filter_for_domino_nt
  • norton_internet_security
  • sav_filter_domino_nt_ports
  • norton_antivirus
  • client_security
  • norton_system_works
  • gateway_security