what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

sec-1-GFI-MailSecurity.txt

sec-1-GFI-MailSecurity.txt
Posted Oct 13, 2005
Authored by Gary O'Leary-Steele | Site sec-1.com

Sec-1 has identified an exploitable Buffer Overflow within the HTTP management interface of GFI MailSecurity 8.1. By sending large strings within several areas of the HTTP request (such as a large 'Host' or 'Accept' header) critical portions of memory are overwritten. Verification of this vulnerability can be achieved through the use of a HTTP fuzzer, such as @stake webproxy. Successful exploitation could allow an attacker to gain administrative control of the targeted host.

tags | advisory, web, overflow, fuzzer
SHA-256 | 4300d283bb084186da283e56ddae0e40446b1e8a04f555832a86566d3489b5db

sec-1-GFI-MailSecurity.txt

Change Mirror Download
                                SEC-1 LTD.
www.sec-1.com

Security Advisory

Advisory Name: GFI MailSecurity 8.1 Web Module Buffer Overflow
Release Date: 12/October/2005
Application: GFI MailSecurity For SMTP version 8.1

Platform: Verified on Windows 2000 Server
Severity: Remote Code Execution
Author: Gary O'leary-Steele
Vendor Status: Patch Released
CVE Candidate: Pending
Reference: http://www.sec-1.com


Overview:

Taken from gfi.com:

GFI MailSecurity for SMTP is a Content filtering, anti-virus and
Email Intrusion prevention product from GFI.

GFI MailSecurity is available as an SMTP gateway version and for
VS API. The gateway version should be deployed at the perimeter
of the network as a mail relay server and scans inbound and
outbound mail. The VS API version integrates seamlessly with
Exchange Server 2000/2003 and scans the Exchange information stores.
Both versions can be deployed simultaneously to achieve optimum
protection.


Vulnerability Details:

Sec-1 has identified an exploitable Buffer Overflow within the HTTP
management interface. By sending large strings within several areas
of the HTTP request (such as a large 'Host' or 'Accept' header)
critical portions of memory are overwritten. Verification of this
vulnerability can be achieved through the use of a HTTP fuzzer, such
as @stake webproxy. Successful exploitation could allow an attacker
to gain administrative control of the targeted host.


Vendor Response:

The vendor has released information and a patch

KB: http://kbase.gfi.com/showarticle.asp?id=KBID002451
Patch: ftp://ftp.gfi.com/patches/MSEC8_PATCH_20050919_01.zip

Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned
the following names to these issues. These are candidates for
inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.


Pending

Copyright 2005 Sec-1 LTD. All rights reserved.
**************************************************************
NEW: Sec-1 Hacking Training - Learn to breach network security
to further your knowledge and protect your network
http://www.sec-1.com/applied_hacking_course.html
**************************************************************
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close