Vulnerability Details : CVE-2010-0107
Buffer overflow in an ActiveX control (SYMLTCOM.dll) in Symantec N360 1.0 and 2.0; Norton Internet Security, AntiVirus, SystemWorks, and Confidential 2006 through 2008; and Symantec Client Security 3.0.x before 3.1 MR9, and 3.1.x before MR9; allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors. NOTE: this is only a vulnerability if the attacker can "masquerade as an authorized site."
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-0107
Probability of exploitation activity in the next 30 days: 2.53%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-0107
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
nvd@nist.gov |
CWE ids for CVE-2010-0107
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0107
-
http://www.vupen.com/english/advisories/2010/0411
Webmail | OVH- OVHVendor Advisory
-
http://www.securitytracker.com/id?1023630
Norton System Works Buffer Overflow in SYMLTCOM.dll ActiveX Control Lets Remote Users Execute Arbitrary Code in Certain Limited Cases - SecurityTracker
-
http://www.securitytracker.com/id?1023628
Norton Internet Security Buffer Overflow in SYMLTCOM.dll ActiveX Control Lets Remote Users Execute Arbitrary Code in Certain Limited Cases - SecurityTracker
-
http://www.securityfocus.com/archive/1/509717/100/0/threaded
SecurityFocus
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_01
Input validation errors in SYMLTCOM.dll can lead to a buffer overflow.
-
http://www.securitytracker.com/id?1023629
Norton Anti-Virus Buffer Overflow in SYMLTCOM.dll ActiveX Control Lets Remote Users Execute Arbitrary Code in Certain Limited Cases - SecurityTracker
-
http://www.securitytracker.com/id?1023631
Symantec Client Security Buffer Overflow in SYMLTCOM.dll ActiveX Control Lets Remote Users Execute Arbitrary Code in Certain Limited Cases - SecurityTracker
-
http://www.securityfocus.com/bid/38217
Multiple Symantec Products 'SYMLTCOM.dll' ActiveX Stack Buffer Overflow Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/56357
Symantec ActiveX control (SYMLTCOM.dll) buffer overflow CVE-2010-0107 Vulnerability Report
Products affected by CVE-2010-0107
- cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_antivirus:2008:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_internet_security:2008:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1.400:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2010:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2020:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1001:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1007:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2021:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1008:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2001:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2002:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1.396:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1000:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2.2011:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1.401:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1.0.401:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.1.1009:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1.0.396:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1:mr4:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1:mr5:*:*:*:*:*:*
- cpe:2.3:a:symantec:client_security:3.1:mr6:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_360:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_360:2.0:*:*:*:*:*:*:*