SecurityGateway < 1.0.2 Administration Interface username Field Remote Overflow

critical Nessus Plugin ID 33104

Synopsis

The remote web server is affected by a buffer overflow vulnerability.

Description

The remote host is running Alt-N's SecurityGateway for Exchange/SMTP, an email spam firewall for Exchange and SMTP servers.

The version of SecurityGateway installed on the remote host is earlier than 1.0.2. Such versions are reportedly affected by a buffer overflow that can be triggered using a long 'username' parameter to the 'SecurityGateway.dll' script to execute arbitrary code on the remote host with SYSTEM-level privileges, potentially resulting in a complete compromise of the affected host.

Solution

Upgrade to SecurityGateway 1.0.2 or later.

See Also

http://files.altn.com/SecurityGateway/Release/relnotes_en.htm

http://lists.altn.com/WebX/[email protected]@

Plugin Details

Severity: Critical

ID: 33104

File Name: securitygateway_1_0_2.nasl

Version: 1.15

Type: remote

Family: Firewalls

Published: 6/6/2008

Updated: 8/22/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Alt-N SecurityGateway username Buffer Overflow)

Reference Information

CVE: CVE-2008-4193

BID: 29457

CWE: 119

Secunia: 30497