'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:333012)

Rule General Information
Release Date: 2021-03-26
Rule Name: Symantec Norton AntiVirus Stack Exhaustion Vulnerability
Severity:
CVE ID:
Rule Protection Details
Description: A vulnerability has been reported in several Symantec products. One of the dynamic link libraries installed by the vulnerable product contains a remotely scriptable ActiveX object which lacks proper input data validation mechanisms. An attacker may instantiate the vulnerable object and supply malicious input data to its function to cause stack exhaustion. The application directly affected by this vulnerability is Internet Explorer, not the affected Symantec product. However, Internet Explorer forks to a new thread when processing embedded script code. As a result, a successful attack only affects the thread created to process the script code embedded in the HTML document. The main thread is not affected during the attack, therefore no unusual behaviour occurs. No other application or service are affected by an exploitation attempt. A remote code injection and execution attack is not possible using this vulnerability.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows
Reference:
Solutions
Please contact the software vendor to update the software patch.