Now SMS/MMS Gateway < 2008.02.22 Multiple Remote Overflows

Critical Nessus Plugin ID 32481


A remote Windows host contains a program that is affected by multiple buffer overflow vulnerabilities.


The remote host is running Now SMS/MMS Gateway, a tool for connecting to SMS and/or MMS messaging providers and managing GSM modems.

The web interface component of the version of Now SMS/MMS Gateway installed on the remote host contains a stack-based buffer overflow that can be triggered using a specially crafted HTTP Authorization request header. An unauthenticated, remote attacker can leverage this issue to crash the affected service or to execute arbitrary code on the affected host subject to the privileges under which the service operates, SYSTEM by default.

In addition, there is similar buffer overflow in the application's SMPP server, which allocates a stack buffer of 4 KB for incoming packets but fails to check their actual size. By default, though, this service is not enabled.


Upgrade to Now SMS/MMS Gateway version 2008.02.22 or later.

See Also

Plugin Details

Severity: Critical

ID: 32481

File Name: nowsms_2008_02_22.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Family: Windows

Published: 2008/06/02

Modified: 2016/05/20

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Metasploit (Now SMS/MMS Gateway Buffer Overflow)

Reference Information

CVE: CVE-2008-0871

BID: 27896

OSVDB: 42953, 42954

EDB-ID: 5695

Secunia: 29003

CWE: 119