GFI MailSecurity for Exchange/SMTP Web界面远程溢出漏洞

GFI MailSecurity for Exchange/SMTP Web界面远程溢出漏洞

漏洞ID 1197579 漏洞类型 缓冲区溢出
发布时间 2005-10-20 更新时间 2005-10-20
图片[1]-GFI MailSecurity for Exchange/SMTP Web界面远程溢出漏洞-安全小百科CVE编号 CVE-2005-3182
图片[2]-GFI MailSecurity for Exchange/SMTP Web界面远程溢出漏洞-安全小百科CNNVD-ID CNNVD-200510-152
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005100034
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200510-152
|漏洞详情
GFIMailSecurityforExchange/SMTP是一种进行电子邮件内容检查、开发探测、危机分析以及反病毒的解决方案。GFIMailSecurityforExchange/SMTP中存在远程缓冲区溢出漏洞。当Web管理界面处理畸形的HTTP请求时,远程攻击者就可以利用这个漏洞在目标系统上执行任意代码。
|漏洞EXP
                                SEC-1 LTD.
                              www.sec-1.com

Security Advisory

Advisory Name:	GFI MailSecurity 8.1 Web Module Buffer Overflow
 Release Date:	12/October/2005
  Application: 	GFI MailSecurity For SMTP version 8.1

Platform: 	Verified on Windows 2000 Server
     Severity: 	Remote Code Execution 
       Author: 	Gary O'leary-Steele 
Vendor Status: 	Patch Released
CVE Candidate: 	Pending
    Reference:  	http://www.sec-1.com

Overview:

Taken from gfi.com:

GFI MailSecurity for SMTP is a Content filtering, anti-virus and 
Email Intrusion prevention product from GFI.

GFI MailSecurity is available as an SMTP gateway version and for 
VS API. The gateway version should be deployed at the perimeter 
of the network as a mail relay server and scans inbound and 
outbound mail. The VS API version integrates seamlessly with 
Exchange Server 2000/2003 and scans the Exchange information stores.
Both versions can be deployed simultaneously to achieve optimum 
protection.

Vulnerability Details:

Sec-1 has identified an exploitable Buffer Overflow within the HTTP
management interface. By sending large strings within several areas
of the HTTP request (such as a large 'Host' or 'Accept' header)
critical portions of memory are overwritten. Verification of this
vulnerability can be achieved through the use of a HTTP fuzzer, such 
as @stake webproxy. Successful exploitation could allow an attacker
to gain administrative control of the targeted host.

Vendor Response:

The vendor has released information and a patch

KB:	http://kbase.gfi.com/showarticle.asp?id=KBID002451
Patch: ftp://ftp.gfi.com/patches/MSEC8_PATCH_20050919_01.zip

Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned 
the following names to these issues.  These are candidates for 
inclusion in the CVE list (http://cve.mitre.org), which standardizes 
names for security problems.

Pending

Copyright 2005 Sec-1 LTD. All rights reserved.
**************************************************************
NEW: Sec-1 Hacking Training - Learn to breach network security 
to further your knowledge and protect your network 
http://www.sec-1.com/applied_hacking_course.html
**************************************************************
|参考资料

来源:BID
名称:15081
链接:http://www.securityfocus.com/bid/15081
来源:SECUNIA
名称:17136
链接:http://secunia.com/advisories/17136/
来源:BUGTRAQ
名称:20051012[SEC-1Advisory]GFIMailSecurity8.1WebModuleBufferOverflow
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112914475508191&w;=2
来源:kbase.gfi.com
链接:http://kbase.gfi.com/showarticle.asp?id=KBID002451
来源:OSVDB
名称:19926
链接:http://www.osvdb.org/19926
来源:SECTRACK
名称:1015046
链接:http://securitytracker.com/id?1015046
来源:SREASON
名称:74
链接:http://securityreason.com/securityalert/74
来源:FULLDISC
名称:20051012[SEC-1Advisory]GFIMailSecurity8.1WebModuleBufferOverflow
链接:http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html

相关推荐: CGIScript.NET csMailto隐藏表单字段远程命令可执行漏洞

CGIScript.NET csMailto隐藏表单字段远程命令可执行漏洞 漏洞ID 1106699 漏洞类型 输入验证 发布时间 2002-04-23 更新时间 2005-10-20 CVE编号 CVE-2002-0749 CNNVD-ID CNNVD-20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享