ID

VAR-200109-0126


CVE

CVE-2001-1456


TITLE

Network Associates CSMAP and smap/smapd vulnerable to buffer overflow thereby allowing arbitrary command execution

Trust: 0.8

sources: CERT/CC: VU#206723

DESCRIPTION

Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. A remotely exploitable buffer overflow exists in the Gauntlet Firewall. A boundary condition error exists in the smap/smapd and CSMAPD daemons, shipped with several popular Network Associates products. The smap/smapd and CSMAP daemons are proxy servers used to handle e-mail transactions for both inbound and outbound e-mail. By successfully exploiting this condition, an attacker may be able to cause arbitrary code/commands to be executed on a vulnerable system with the privileges of the attacked daemon. Additional technical details are currently unknown. Some versions of SGI IRIX shipped with the Gauntlet Firewall package, and in the past it was a supported SGI product. While it is no longer being supported, SGI IRIX versions 6.5.2, 6.5.3, 6.5.4 and 6.5.5 may be prone to this issue

Trust: 1.98

sources: NVD: CVE-2001-1456 // CERT/CC: VU#206723 // BID: 3290 // VULHUB: VHN-4260

AFFECTED PRODUCTS

vendor:network associatesmodel:mcafee e-ppliancescope:eqversion:120_series

Trust: 1.6

vendor:sgimodel:irixscope:eqversion:6.5

Trust: 1.3

vendor:sgimodel:irixscope:eqversion:6.4

Trust: 1.3

vendor:sgimodel:irixscope:eqversion:6.3

Trust: 1.3

vendor:sgimodel:irixscope:eqversion:6.2

Trust: 1.3

vendor:network associatesmodel:gauntlet firewallscope:eqversion:unix_6.0

Trust: 1.0

vendor:network associatesmodel:gauntlet firewallscope:eqversion:4.2

Trust: 1.0

vendor:pgpmodel:e-ppliance 300scope:eqversion:1.5

Trust: 1.0

vendor:network associatesmodel:gauntlet firewallscope:eqversion:unix_5.0

Trust: 1.0

vendor:network associatesmodel:gauntlet firewallscope:eqversion:unix_5.5

Trust: 1.0

vendor:pgpmodel:e-ppliance 300scope:eqversion:2.0

Trust: 1.0

vendor:mcafeemodel:webshield smtpscope:eqversion:4.1

Trust: 1.0

vendor:mcafeemodel:webshield smtpscope:eqversion:4.0

Trust: 1.0

vendor:network associatesmodel:mcafee e-ppliancescope:eqversion:100_series

Trust: 1.0

vendor:pgpmodel:e-ppliance 300scope:eqversion:1.0

Trust: 1.0

vendor:pgpmodel: - scope: - version: -

Trust: 0.8

vendor:securecomputingmodel:pgp e-ppliancescope:eqversion:3002.0

Trust: 0.3

vendor:securecomputingmodel:pgp e-ppliancescope:eqversion:3001.5

Trust: 0.3

vendor:securecomputingmodel:pgp e-ppliancescope:eqversion:3001.0

Trust: 0.3

vendor:networkmodel:associates pgp e-ppliance seriesscope:eqversion:3002.0

Trust: 0.3

vendor:networkmodel:associates pgp e-ppliance seriesscope:eqversion:3001.5

Trust: 0.3

vendor:networkmodel:associates pgp e-ppliance seriesscope:eqversion:3001.0

Trust: 0.3

vendor:networkmodel:associates gauntlet firewall for unixscope:eqversion:6.0

Trust: 0.3

vendor:networkmodel:associates gauntlet firewall for unixscope:eqversion:5.5

Trust: 0.3

vendor:networkmodel:associates gauntlet firewall for unixscope:eqversion:5.0

Trust: 0.3

vendor:networkmodel:associates gauntlet firewallscope:eqversion:4.2

Trust: 0.3

vendor:mcafeemodel:webshield for solarisscope:eqversion:4.0

Trust: 0.3

sources: CERT/CC: VU#206723 // BID: 3290 // CNNVD: CNNVD-200109-005 // NVD: CVE-2001-1456

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2001-1456
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#206723
value: 50.63

Trust: 0.8

CNNVD: CNNVD-200109-005
value: HIGH

Trust: 0.6

VULHUB: VHN-4260
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2001-1456
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4260
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#206723 // VULHUB: VHN-4260 // CNNVD: CNNVD-200109-005 // NVD: CVE-2001-1456

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-4260 // NVD: CVE-2001-1456

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200109-005

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200109-005

EXTERNAL IDS

db:CERT/CCid:VU#206723

Trust: 2.5

db:BIDid:3290

Trust: 2.0

db:NVDid:CVE-2001-1456

Trust: 2.0

db:CNNVDid:CNNVD-200109-005

Trust: 0.7

db:SGIid:20011104-01-I

Trust: 0.6

db:CERT/CCid:CA-2001-25

Trust: 0.6

db:XFid:7088

Trust: 0.6

db:VULHUBid:VHN-4260

Trust: 0.1

sources: CERT/CC: VU#206723 // VULHUB: VHN-4260 // BID: 3290 // CNNVD: CNNVD-200109-005 // NVD: CVE-2001-1456

REFERENCES

url:http://www.securityfocus.com/bid/3290

Trust: 1.7

url:http://www.cert.org/advisories/ca-2001-25.html

Trust: 1.7

url:http://www.kb.cert.org/vuls/id/206723

Trust: 1.7

url:ftp://patches.sgi.com/support/free/security/advisories/20011104-01-i

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/7088

Trust: 1.1

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/7088

Trust: 0.6

url:http://www.pgp.com/support/product-advisories/csmap.asp

Trust: 0.3

sources: CERT/CC: VU#206723 // VULHUB: VHN-4260 // BID: 3290 // CNNVD: CNNVD-200109-005 // NVD: CVE-2001-1456

CREDITS

Discovered by Jim Stickley of Garrison Technologies and published in a PGP Security Advisory on September 4, 2001.

Trust: 0.9

sources: BID: 3290 // CNNVD: CNNVD-200109-005

SOURCES

db:CERT/CCid:VU#206723
db:VULHUBid:VHN-4260
db:BIDid:3290
db:CNNVDid:CNNVD-200109-005
db:NVDid:CVE-2001-1456

LAST UPDATE DATE

2024-08-14T14:59:33.784000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#206723date:2001-09-06T00:00:00
db:VULHUBid:VHN-4260date:2017-07-11T00:00:00
db:BIDid:3290date:2015-03-19T09:07:00
db:CNNVDid:CNNVD-200109-005date:2006-09-22T00:00:00
db:NVDid:CVE-2001-1456date:2017-07-11T01:29:08.197

SOURCES RELEASE DATE

db:CERT/CCid:VU#206723date:2001-09-06T00:00:00
db:VULHUBid:VHN-4260date:2001-09-04T00:00:00
db:BIDid:3290date:2001-09-04T00:00:00
db:CNNVDid:CNNVD-200109-005date:2001-09-04T00:00:00
db:NVDid:CVE-2001-1456date:2001-09-04T04:00:00