NAI WebShield SMTP SET_CONFIG Overflow

2000-05-25T00:00:00
ID OSVDB:327
Type osvdb
Reporter DCIST(securityteam@delphisplc.com)
Modified 2000-05-25T00:00:00

Description

Vulnerability Description

A remote overflow exists in WebShield SMTP. The product fails to validate input to the SET_CONFIG command resulting in a buffer overflow. With a specially crafted request exceeding 208 bytes, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: 1. Run the service as a restricted user, not with SYSTEM privileges. 2. Use access controls to restrict access to port 9999

Short Description

A remote overflow exists in WebShield SMTP. The product fails to validate input to the SET_CONFIG command resulting in a buffer overflow. With a specially crafted request exceeding 208 bytes, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.

References:

Related OSVDB ID: 326 Nessus Plugin ID:10425 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2000-05/0308.html Keyword: Port 9999 ISS X-Force ID: 4540 CVE-2000-0447 Bugtraq ID: 1254