Symantec Mail Security for SMTP KeyView Excel SST Parsing RCE

high Nessus Plugin ID 40871


An email security application running on the remote Windows host is affected by a remote code execution vulnerability.


The version of Symantec Mail Security for SMTP running on the remote host is affected by an integer overflow condition when parsing a Shared String Table (SST) record inside of an Excel file. One of the fields in the SST is a 32-bit integer used to specify the size of a dynamic memory allocation. This integer is not validated, which can result in a heap-based buffer overflow condition. A remote attacker can exploit this by tricking a user into viewing an email with a specially crafted Excel file, resulting in the execution of arbitrary code as SYSTEM.


Apply patch level 205.

See Also

Plugin Details

Severity: High

ID: 40871

File Name: sms_smtp_keyview_overflow.nasl

Version: 1.20

Type: local

Agent: windows

Family: Windows

Published: 9/4/2009

Updated: 8/5/2020

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2009-3037


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:mail_security

Required KB Items: Symantec/SMSSMTP/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/25/2009

Vulnerability Publication Date: 8/25/2009

Reference Information

CVE: CVE-2009-3037

BID: 36042

Secunia: 36421

IAVB: 2009-B-0042-S

CWE: 119