Symantec Mail Security for SMTP File Parsing Vulnerabilities

critical Nessus Plugin ID 27586


The remote Windows host contains an application that is affected by multiple vulnerabilities.


Symantec Mail Security for SMTP, which provides anti-spam and anti- virus protection for the IIS SMTP Service, is installed on the remote Windows host.

The version of Symantec Mail Security for SMTP installed on the remote host reportedly is affected by multiple vulnerabilities caused by buffer overflows in third-party file viewers. Using a specially- crafted email message with an executable attachment, a remote attacker may be able to leverage this issue to crash the service or execute arbitrary code.

Note that successful exploitation of this issue would allow an attacker to gain complete control of the affected host as Symantec Mail Security for SMTP runs with LOCAL SYSTEM privileges by default.


Upgrade as necessary to Symantec Mail Security for SMTP 5.0.1 and apply patch 182 or later as Secunia claims the issues were silently patched.

See Also

Plugin Details

Severity: Critical

ID: 27586

File Name: sms_smtp_file_parsing_vulns.nasl

Version: 1.9

Type: local

Agent: windows

Family: Windows

Published: 10/28/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: SMB/Registry/Enumerated