Symantec Mail Security for SMTP File Parsing Vulnerabilities

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by
multiple vulnerabilities.

Description :

Symantec Mail Security for SMTP, which provides anti-spam and anti-
virus protection for the IIS SMTP Service, is installed on the remote
Windows host.

The version of Symantec Mail Security for SMTP installed on the remote
host reportedly is affected by multiple vulnerabilities caused by
buffer overflows in third-party file viewers. Using a specially-
crafted email message with an executable attachment, a remote attacker
may be able to leverage this issue to crash the service or execute
arbitrary code.

Note that successful exploitation of this issue would allow an
attacker to gain complete control of the affected host as Symantec
Mail Security for SMTP runs with LOCAL SYSTEM privileges by default.

See also :

http://secunia.com/advisories/27367/

Solution :

Upgrade as necessary to Symantec Mail Security for SMTP 5.0.1 and
apply patch 182 or later as Secunia claims the issues were silently
patched.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Windows

Nessus Plugin ID: 27586 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now