Symantec Mail Security for SMTP KeyView Excel SST Parsing RCE

high Nessus Plugin ID 40871

Synopsis

An email security application running on the remote Windows host is affected by a remote code execution vulnerability.

Description

The version of Symantec Mail Security for SMTP running on the remote host is affected by an integer overflow condition when parsing a Shared String Table (SST) record inside of an Excel file. One of the fields in the SST is a 32-bit integer used to specify the size of a dynamic memory allocation. This integer is not validated, which can result in a heap-based buffer overflow condition. A remote attacker can exploit this by tricking a user into viewing an email with a specially crafted Excel file, resulting in the execution of arbitrary code as SYSTEM.

Solution

Apply patch level 205.

See Also

http://www.nessus.org/u?72cc3878

http://www.nessus.org/u?7daa28ca

Plugin Details

Severity: High

ID: 40871

File Name: sms_smtp_keyview_overflow.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 9/4/2009

Updated: 8/5/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2009-3037

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: Symantec/SMSSMTP/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/25/2009

Vulnerability Publication Date: 8/25/2009

Reference Information

CVE: CVE-2009-3037

BID: 36042

CWE: 119

IAVB: 2009-B-0042-S

Secunia: 36421