Overview
A remotely exploitable buffer overflow exists in the Gauntlet Firewall.
Description
The buffer overflow occurs in the smap/smapd and CSMAP daemons. According to PGP Security, these daemons are responsible for handling email transactions for both inbound and outbound e-mail. This vulnerability occurs in smap/smapd on the following products:
|
Impact
An intruder can execute arbitrary code with the privileges of the corresponding daemon. |
Solution
Patchs for this vulnerability are available from the vendor at ftp://ftp.nai.com/pub/security/ and http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp. |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was discovered by Jim Stickley of Garrison Technologies.
This document was written by Ian A. Finlay.
Other Information
| CVE IDs: | None |
| Severity Metric: | 50.63 |
| Date Public: | 2001-09-04 |
| Date First Published: | 2001-09-06 |
| Date Last Updated: | 2001-09-06 21:02 UTC |
| Document Revision: | 27 |