First published: Tue Sep 04 2001(Updated: )
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Network Associates Gauntlet Firewall | =unix_5.0 | |
Mcafee Webshield Smtp | =4.1 | |
Network Associates Gauntlet Firewall | =4.2 | |
Pgp E-ppliance 300 | =2.0 | |
SGI IRIX | =6.4 | |
Mcafee Webshield Smtp | =4.0 | |
SGI IRIX | =6.3 | |
Pgp E-ppliance 300 | =1.5 | |
Pgp E-ppliance 300 | =1.0 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.2 | |
Network Associates Gauntlet Firewall | =unix_5.5 | |
Network Associates Gauntlet Firewall | =unix_6.0 | |
Network Associates Mcafee E-ppliance | =100_series | |
Network Associates Mcafee E-ppliance | =120_series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.