Symantec Mail Security for SMTP Message Handling Arbitrary Code Execution

High Nessus Plugin ID 24755


The remote Windows host contains an application that may allow arbitrary code execution.


Symantec Mail Security for SMTP, which provides antispam and anti- virus protection for the IIS SMTP Service, is installed on the remote Windows host.

There is reportedly an issue with the version of Symantec Mail Security for SMTP on the remote host that can be triggered by messages with malformed headers and lead to a crash or arbitrary code execution.

Note that successful exploitation of this issue would allow an attacker to gain complete control of the affected host as Symantec Mail Security for SMTP runs with LOCAL SYSTEM privileges by default.


Upgrade as necessary to Symantec Mail Security for SMTP 5.0 and apply patch 175 or later.

See Also

Plugin Details

Severity: High

ID: 24755

File Name: sms_smtp_code_exec.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2007/03/05

Modified: 2016/05/13

Dependencies: 13855, 10456

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2007/02/14

Reference Information

CVE: CVE-2007-1252

BID: 22782

OSVDB: 33840

CERT: 875633