Symantec Mail Security for SMTP KeyView Excel SST Parsing RCE

High Nessus Plugin ID 40871


An email security application running on the remote Windows host is affected by a remote code execution vulnerability.


The version of Symantec Mail Security for SMTP running on the remote host is affected by an integer overflow condition when parsing a Shared String Table (SST) record inside of an Excel file. One of the fields in the SST is a 32-bit integer used to specify the size of a dynamic memory allocation. This integer is not validated, which can result in a heap-based buffer overflow condition. A remote attacker can exploit this by tricking a user into viewing an email with a specially crafted Excel file, resulting in the execution of arbitrary code as SYSTEM.


Apply patch level 205.

See Also

Plugin Details

Severity: High

ID: 40871

File Name: sms_smtp_keyview_overflow.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2009/09/04

Modified: 2016/12/09

Dependencies: 40870

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: Symantec/SMSSMTP/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/08/25

Vulnerability Publication Date: 2009/08/25

Reference Information

CVE: CVE-2009-3037

BID: 36042

OSVDB: 57334

Secunia: 36421

IAVB: 2009-B-0042

CWE: 119