First published: Tue Sep 04 2001(Updated: )
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee WebShield SMTP | =4.0 | |
McAfee WebShield SMTP | =4.1 | |
Network Associates Gauntlet Firewall | =4.2 | |
Network Associates Gauntlet Firewall | =unix_5.0 | |
Network Associates Gauntlet Firewall | =unix_5.5 | |
Network Associates Gauntlet Firewall | =unix_6.0 | |
Ensim WEBppliance | =1.0 | |
Ensim WEBppliance | =1.5 | |
Ensim WEBppliance | =2.0 | |
SGI IRIX | =6.2 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5 | |
network associates mcafee e-ppliance | =100_series | |
network associates mcafee e-ppliance | =120_series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1456 has a high severity rating due to the potential for remote code execution.
To fix CVE-2001-1456, apply available patches from the affected software vendors or upgrade to appropriate software versions.
CVE-2001-1456 affects versions of Network Associates Gauntlet Firewall, McAfee WebShield SMTP, and SGI IRIX.
A buffer overflow vulnerability, like CVE-2001-1456, occurs when software writes more data to a buffer than it can hold, leading to potential exploitation.
Yes, CVE-2001-1456 can be exploited remotely through a specially crafted mail message.