{"vuid":"VU#697598","idnumber":"697598","name":"Symantec Brightmail Anti-Spam Spamhunter UTF encoding error","keywords":["Symantec Brightmail","Spamhunter","DoS","denial-of-service","UTF encoding","parse error"],"overview":"Symantec Brightmail Anti-Spam Spamhunter crashes when trying to convert certain valid character sets to UTF, resulting in a denial-of-service condition.","clean_desc":"Brightmail Anti-Spam Spamhunter is a spam filter designed for corporate environments. The Brightmail Anti-Spam Spamhunter module cannot parse the following character sets: ISO-8859-10 (Latin 6)\nISO-8859-13 (Latin 7)\nISO-8859-15 (Nordic)\nCP866 (Russian) According to the notes included with Spamhunter Patch 132: The character converters used by the Spamhunter and Language ID modules do not recognize certain valid character encoding sets, specifically ISO-8859-10, ISO-8859-13, ISO-8859-15 (nordic), and CP866 (russian). Previously, these modules assumed that a valid encoding meant the converter would recognize the character set. In the case of ISO-8859-10, when the converter did not recognize the character set, a crash would result.","impact":"If a remote attacker supplies the Brightmail Anti-Spam Spamhunter with a specially crafted email that is encoded with one of the character sets Spamhunter cannot parse (see list above), that attacker may be able to crash the service resulting in a denial-of-service condition.","resolution":"Apply Patch Symantec has released a Patch 132 to correct this issue.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly reported by Symantec.","author":"This document was written by Jeff Gennari.","public":["ftp://ftp.symantec.com/public/english_us_canada/products/sba/sba_60x/updates/p132_notes.htm","http://secunia.com/advisories/13489/","http://www.osvdb.org/displayvuln.php?osvdb_id=12459","http://xforce.iss.net/xforce/xfdb/18530"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-12-20T14:18:10Z","publicdate":"2004-12-17T00:00:00Z","datefirstpublished":"2005-01-05T21:15:56Z","dateupdated":"2005-01-05T21:16:06Z","revision":62,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"11","cam_attackeraccessrequired":"17","cam_scorecurrent":"2.99784375","cam_scorecurrentwidelyknown":"3.78675","cam_scorecurrentwidelyknownexploited":"6.942375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.99784375,"vulnote":null}