{"vuid":"VU#206723","idnumber":"206723","name":"Network Associates CSMAP and smap/smapd vulnerable to buffer overflow thereby allowing arbitrary command execution","keywords":["Network Associates","McAfee Webshield","Gauntlet","PGP e-ppliance","CSMAP","smap","smapd","buffer overflow","arbitrary command execution"],"overview":"A remotely exploitable buffer overflow exists in the Gauntlet Firewall.","clean_desc":"The buffer overflow occurs in the smap/smapd and CSMAP daemons. According to PGP Security, these daemons are responsible for handling email transactions for both inbound and outbound e-mail. This vulnerability occurs in smap/smapd on the following products: Gauntlet for Unix  versions 5.x\nPGP e-ppliance 300 series version 1.0\nMcAfee e-ppliance 100 and 120 series\nThis vulnerability occurs in CSMAP on the following products: Gauntlet for Unix  version 6.0\nPGP e-ppliance 300 series versions 1.5, 2.0\nPGP e-ppliance 1000 series versions 1.5, 2.0\nMcAfee WebShield for Solaris v4.1","impact":"An intruder can execute arbitrary code with the privileges of the corresponding daemon.","resolution":"Patchs for this vulnerability are available from the vendor at ftp://ftp.nai.com/pub/security/ and http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Jim Stickley of \nGarrison Technologies","author":"This document was written by Ian A. Finlay.","public":["h","t","t","p",":","/","/","w","w","w",".","p","g","p",".","c","o","m","/","s","u","p","p","o","r","t","/","p","r","o","d","u","c","t","-","a","d","v","i","s","o","r","i","e","s","/","c","s","m","a","p",".","a","s","p"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-09-05T18:11:18Z","publicdate":"2001-09-04T00:00:00Z","datefirstpublished":"2001-09-06T20:37:10Z","dateupdated":"2001-09-06T21:02:09Z","revision":27,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"50.625","cam_scorecurrentwidelyknown":"59.0625","cam_scorecurrentwidelyknownexploited":"92.8125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":50.625,"vulnote":null}