First published: Mon Mar 15 2004(Updated: )
Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Iss Realsecure Desktop | =7.0ebg | |
Iss Realsecure Guard | =3.6ecb | |
Iss Realsecure Sentry | =3.6ecf | |
ISS RealSecure Server Sensor | =7.0-xpu20.16 | |
Iss Realsecure Desktop | =3.6ecf | |
ISS BlackICE PC Protection | =3.6cbd | |
Iss Blackice Agent Server | =3.6eca | |
Iss Realsecure Network | =7.0-xpu_20.15 | |
Iss Blackice Server Protection | =3.6cbz | |
Iss Realsecure Desktop | =3.6eca | |
Iss Realsecure Desktop | =7.0epk | |
Iss Proventia G Series Xpu | =22.3 | |
Iss Proventia M Series Xpu | =1.30 | |
Iss Proventia A Series Xpu | =20.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.