Network Associates CSMAP and smap/smapd vulnerable to buffer overflow thereby allowing arbitrary command execution

2001-09-06T00:00:00
ID VU:206723
Type cert
Reporter CERT
Modified 2001-09-06T21:02:00

Description

Overview

A remotely exploitable buffer overflow exists in the Gauntlet Firewall.

Description

The buffer overflow occurs in the smap/smapd and CSMAP daemons. According to PGP Security, these daemons are responsible for handling email transactions for both inbound and outbound e-mail.

This vulnerability occurs in smap/smapd on the following products:

* Gauntlet for Unix versions 5.x
* PGP e-ppliance 300 series version 1.0
* McAfee e-ppliance 100 and 120 series

This vulnerability occurs in CSMAP on the following products: * Gauntlet for Unix version 6.0 * PGP e-ppliance 300 series versions 1.5, 2.0 * PGP e-ppliance 1000 series versions 1.5, 2.0 * McAfee WebShield for Solaris v4.1


Impact

An intruder can execute arbitrary code with the privileges of the corresponding daemon.


Solution

Patchs for this vulnerability are available from the vendor at <ftp://ftp.nai.com/pub/security/> and <http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp>.


Vendor Information

206723

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Vendor has issued information

__ Sort by: Status Alphabetical

Expand all

Affected Unknown __ Unaffected

Javascript is disabled. Click here to view vendors.

PGP

Updated: September 06, 2001

Status

__ Vulnerable

Vendor Statement

Please see <http://www.pgp.com/support/product-advisories/csmap.asp>

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A

References

<http://www.pgp.com/support/product-advisories/csmap.asp>

Credit

This vulnerability was discovered by Jim Stickley of Garrison Technologies

This document was written by Ian A. Finlay.

Other Information

CVE IDs: | None
---|---
Severity Metric:** | 50.63
Date Public:
| 2001-09-04
Date First Published: | 2001-09-06
Date Last Updated: | 2001-09-06 21:02 UTC
Document Revision: | 24