Vulnerabilities > Norman

DATE CVE VULNERABILITY TITLE RISK
2007-08-31 CVE-2007-4648 Buffer Errors vulnerability in Norman Virus Control 5.82
The nvcoaft51 driver in Norman Virus Control (NVC) 5.82 uses weak permissions (unrestricted write access) for the NvcOa device, which allows local users to gain privileges by (1) triggering a buffer overflow in a kernel pool via a string argument to ioctl 0xBF67201C; or by (2) sending a crafted KEVENT structure through ioctl 0xBF672028 to overwrite arbitrary memory locations.
local
low complexity
norman CWE-119
7.2
2007-07-24 CVE-2007-3953 Denial Of Service vulnerability in Norman Virus Control DOC OLE File Parsing
The OLE2 parsing in Norman Antivirus before 5.91.02 allows remote attackers to cause a denial of service via a crafted DOC file that triggers a divide-by-zero error.
network
norman
4.3
2007-07-24 CVE-2007-3952 Unspecified vulnerability in Norman Normon Antivirus
The OLE2 parsing in Norman Antivirus before 5.91.02 allows remote attackers to bypass the malware detection via a crafted DOC file, resulting from an "integer cast around".
network
low complexity
norman
7.5
2007-07-24 CVE-2007-3951 Buffer-Overflow vulnerability in Multiple Norman Virus Control Products LZH
Multiple buffer overflows in Norman Antivirus 5.90 allow remote attackers to execute arbitrary code via a crafted (1) ACE or (2) LZH file, resulting from an "integer cast around."
network
low complexity
norman
7.5
2007-03-02 CVE-2007-1194 Information Exposure vulnerability in Norman Sandbox Analyzer
Norman SandBox Analyzer does not use the proper range for Interrupt Descriptor Table (IDT) entries, which allows local users to determine that the local machine is an emulator, or a similar environment not based on a physical Intel processor, which allows attackers to produce malware that is more difficult to analyze.
local
low complexity
norman CWE-200
2.1
2005-10-30 CVE-2005-3378 Unspecified vulnerability in Norman Virus Control 5.81Engine5.83.02
Multiple interpretation error in Norman 5.81 with the 5.83.02 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
network
high complexity
norman
5.1
2005-10-14 CVE-2005-3220 Security Bypass vulnerability in Virus Control Antivirus
Multiple interpretation error in unspecified versions of Norman Virus Control Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
network
high complexity
norman
5.1