Symantec Mail Security for SMTP Message Handling Arbitrary Code Execution

high Nessus Plugin ID 24755

Synopsis

The remote Windows host contains an application that may allow arbitrary code execution.

Description

Symantec Mail Security for SMTP, which provides antispam and anti- virus protection for the IIS SMTP Service, is installed on the remote Windows host.

There is reportedly an issue with the version of Symantec Mail Security for SMTP on the remote host that can be triggered by messages with malformed headers and lead to a crash or arbitrary code execution.

Note that successful exploitation of this issue would allow an attacker to gain complete control of the affected host as Symantec Mail Security for SMTP runs with LOCAL SYSTEM privileges by default.

Solution

Upgrade as necessary to Symantec Mail Security for SMTP 5.0 and apply patch 175 or later.

See Also

http://www.nessus.org/u?e22007ca

Plugin Details

Severity: High

ID: 24755

File Name: sms_smtp_code_exec.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 3/5/2007

Updated: 7/30/2018

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/14/2007

Reference Information

CVE: CVE-2007-1252

BID: 22782

CERT: 875633