Symantec Mail Security for SMTP File Parsing Vulnerabilities

critical Nessus Plugin ID 27586

Synopsis

The remote Windows host contains an application that is affected by multiple vulnerabilities.

Description

Symantec Mail Security for SMTP, which provides anti-spam and anti- virus protection for the IIS SMTP Service, is installed on the remote Windows host.

The version of Symantec Mail Security for SMTP installed on the remote host reportedly is affected by multiple vulnerabilities caused by buffer overflows in third-party file viewers. Using a specially- crafted email message with an executable attachment, a remote attacker may be able to leverage this issue to crash the service or execute arbitrary code.

Note that successful exploitation of this issue would allow an attacker to gain complete control of the affected host as Symantec Mail Security for SMTP runs with LOCAL SYSTEM privileges by default.

Solution

Upgrade as necessary to Symantec Mail Security for SMTP 5.0.1 and apply patch 182 or later as Secunia claims the issues were silently patched.

See Also

https://secuniaresearch.flexerasoftware.com/advisories/27367/

Plugin Details

Severity: Critical

ID: 27586

File Name: sms_smtp_file_parsing_vulns.nasl

Version: 1.9

Type: local

Agent: windows

Family: Windows

Published: 10/28/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: SMB/Registry/Enumerated