GFI MailSecurity HTTP Management Interface Request Header Overflow

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote host contains an application that is affected by a buffer
overflow vulnerability.

Description :

According to its version number, the instance of GFI MailSecurity on
the remote host suffers from a buffer overflow in its web-based
moderator interface. An unauthenticated attacker can reportedly
exploit this flaw by sending large strings in several areas of the
HTTP request to gain control of the remote host.

See also :

http://online.securityfocus.com/archive/1/413142/30/0/threaded
http://kbase.gfi.com/showarticle.asp?id=KBID002451

Solution :

Apply the patch referenced in the vendor advisory above.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 20016 (mailsecurity_web_module_overflow.nasl)

Bugtraq ID: 15081

CVE ID: CVE-2005-3182

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now