漏洞信息详情
基于Unix的Gauntlet Firewall和WebShield CSMAP以及smap/smapd缓冲区溢出漏洞
漏洞简介
Gauntlet Firewall 5.0到6.0版本的(1)smap/smapd和(2)CSMAP守护进程存在缓冲区溢出漏洞。远程攻击者借助特制的邮件消息执行任意代码。
漏洞公告
A patch to repair this vulnerability is available for all Network Associates products listed as being vulnerable at ftp://ftp.nai.com/pub/security/ and http://www.pgp.com/naicommon/download/upgrade/upgrades-patch.asp for the Gauntlet and PGP e-ppliance products and www.mcafeeb2b.com for the McAfee e-ppliance and WebShield products.
参考网址
来源:US-CERT Vulnerability Note: VU#206723 名称: VU#206723 链接:http://www.kb.cert.org/vuls/id/206723 来源:CERT/CC Advisory: CA-2001-25 名称: CA-2001-25 链接:http://www.cert.org/advisories/CA-2001-25.html 来源: SGI 名称: 20011104-01-I 链接:ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I 来源: XF 名称: gauntlet-csmap-bo(7088) 链接:http://xforce.iss.net/xforce/xfdb/7088 来源: BID 名称: 3290 链接:http://www.securityfocus.com/bid/3290
受影响实体
- Network_associates Mcafee_e-Ppliance:120_series<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...