基于Unix的Gauntlet Firewall和WebShield CSMAP以及smap/smapd缓冲区溢出漏洞

漏洞信息详情

基于Unix的Gauntlet Firewall和WebShield CSMAP以及smap/smapd缓冲区溢出漏洞

漏洞简介

Gauntlet Firewall 5.0到6.0版本的(1)smap/smapd和(2)CSMAP守护进程存在缓冲区溢出漏洞。远程攻击者借助特制的邮件消息执行任意代码。

漏洞公告

A patch to repair this vulnerability is available for all Network Associates products listed as being vulnerable at ftp://ftp.nai.com/pub/security/ and
http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp for the Gauntlet and PGP e-ppliance products and www.mcafeeb2b.com for the McAfee e-ppliance and WebShield products.

参考网址

来源:US-CERT Vulnerability Note: VU#206723
名称: VU#206723
链接:http://www.kb.cert.org/vuls/id/206723

来源:CERT/CC Advisory: CA-2001-25
名称: CA-2001-25
链接:http://www.cert.org/advisories/CA-2001-25.html

来源: SGI
名称: 20011104-01-I
链接:ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I

来源: XF
名称: gauntlet-csmap-bo(7088)
链接:http://xforce.iss.net/xforce/xfdb/7088

来源: BID
名称: 3290
链接:http://www.securityfocus.com/bid/3290

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享