Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well.
References
Configurations
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0290.html - | |
References | () http://kbase.gfi.com/showarticle.asp?id=KBID002451 - Patch | |
References | () http://marc.info/?l=bugtraq&m=112914475508191&w=2 - | |
References | () http://secunia.com/advisories/17136/ - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/74 - | |
References | () http://securitytracker.com/id?1015046 - | |
References | () http://www.osvdb.org/19926 - | |
References | () http://www.securityfocus.com/bid/15081 - Patch |
Information
Published : 2005-10-20 10:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3182
Mitre link : CVE-2005-3182
CVE.ORG link : CVE-2005-3182
JSON object : View
Products Affected
gfi
- mailsecurity
CWE