GFI MailSecurity 8.1 Web Module Buffer Overflow

2005.10.12
Risk: High
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

SEC-1 LTD. www.sec-1.com Security Advisory Advisory Name: GFI MailSecurity 8.1 Web Module Buffer Overflow Release Date: 12/October/2005 Application: GFI MailSecurity For SMTP version 8.1 Platform: Verified on Windows 2000 Server Severity: Remote Code Execution Author: Gary O'leary-Steele Vendor Status: Patch Released CVE Candidate: Pending Reference: http://www.sec-1.com Overview: Taken from gfi.com: GFI MailSecurity for SMTP is a Content filtering, anti-virus and Email Intrusion prevention product from GFI. GFI MailSecurity is available as an SMTP gateway version and for VS API. The gateway version should be deployed at the perimeter of the network as a mail relay server and scans inbound and outbound mail. The VS API version integrates seamlessly with Exchange Server 2000/2003 and scans the Exchange information stores. Both versions can be deployed simultaneously to achieve optimum protection. Vulnerability Details: Sec-1 has identified an exploitable Buffer Overflow within the HTTP management interface. By sending large strings within several areas of the HTTP request (such as a large 'Host' or 'Accept' header) critical portions of memory are overwritten. Verification of this vulnerability can be achieved through the use of a HTTP fuzzer, such as @stake webproxy. Successful exploitation could allow an attacker to gain administrative control of the targeted host. Vendor Response: The vendor has released information and a patch KB: http://kbase.gfi.com/showarticle.asp?id=KBID002451 Patch: ftp://ftp.gfi.com/patches/MSEC8_PATCH_20050919_01.zip Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. Pending Copyright 2005 Sec-1 LTD. All rights reserved. ************************************************************** NEW: Sec-1 Hacking Training - Learn to breach network security to further your knowledge and protect your network http://www.sec-1.com/applied_hacking_course.html **************************************************************


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top