{"vuid":"VU#619982","idnumber":"619982","name":"Zone Labs desktop security products fail to properly validate RCPT TO command argument","keywords":["Zone Labs","ZoneAlarm","Integrity client","buffer overflow","RCPT TO","Simple Mail Transfer Protocol","SMTP","TrueVector Internet Monitor","vsmon.exe"],"overview":"Zone Labs desktop security products contains a buffer overflow in the code that processes the RCPT TO command argument. This could allow an attacker to execute arbitrary code with SYSTEM privileges.","clean_desc":"Zone Labs offers a suite of desktop security products. These products provide a feature that allows incoming and outgoing e-mail messages to be analyzed for malicious content. There is a buffer overflow vulnerability in the component responsible for processing the RCPT TO command argument. By supplying an overly long value to the RCPT TO command, an attacker could execute arbitrary code with SYSTEM privileges. This vulnerability could be exploited remotely if an attacker could cause the victim's system to send a crafted outgoing message.","impact":"An attacker could execute arbitrary code with SYSTEM privileges.","resolution":"Upgrade According to Zone Labs Security Advisory: ZoneAlarm, ZoneAlarm Plus, and ZoneAlarm Pro users should upgrade to version: 4.5.538.001. To update your Zone Labs client product: 1. Select Overview > Preferences. 2. In the Check for Updates area, choose an update option. Automatically: Zone Labs security software automatically notifies you when an update is available. Manually: You monitor the Status tab for updates. To invoke an update check immediately, click \"Check for Update\". Integrity 4.0 users should upgrade to Integrity client version: 4.0.146.046. Integrity 4.5 users should upgrade to Integrity client version: 4.5.085. Integrity updates are available on the Zone Labs Enterprise Support web site.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by \neEye Digital Security","author":"This document was written by Damon Morda.","public":["http://www.eeye.com/html/Research/Advisories/AD20040219.html","http://www.eeye.com/html/Research/Upcoming/20040213-2.html","http://download.zonelabs.com/bin/free/securityAlert/8.html","http://secunia.com/advisories/10921/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-02-16T16:19:10Z","publicdate":"2004-02-13T00:00:00Z","datefirstpublished":"2004-02-24T14:43:56Z","dateupdated":"2004-02-24T21:51:52Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"8","cam_attackeraccessrequired":"13","cam_scorecurrent":"10.9395","cam_scorecurrentwidelyknown":"13.42575","cam_scorecurrentwidelyknownexploited":"23.37075","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.9395,"vulnote":null}