Symantec Mail Security for SMTP KeyView Excel SST Parsing RCE

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

An email security application running on the remote Windows host is
affected by a remote code execution vulnerability.

Description :

The version of Symantec Mail Security for SMTP running on the remote
host is affected by an integer overflow condition when parsing a
Shared String Table (SST) record inside of an Excel file. One of the
fields in the SST is a 32-bit integer used to specify the size of a
dynamic memory allocation. This integer is not validated, which can
result in a heap-based buffer overflow condition. A remote attacker
can exploit this by tricking a user into viewing an email with a
specially crafted Excel file, resulting in the execution of arbitrary
code as SYSTEM.

See also :

http://www.nessus.org/u?72cc3878
http://www.nessus.org/u?e25c6dae

Solution :

Apply patch level 205.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 40871 ()

Bugtraq ID: 36042

CVE ID: CVE-2009-3037

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now