First published: Wed Sep 01 2004(Updated: )
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zonelabs ZoneAlarm | =4.0 | |
Zonelabs ZoneAlarm | =4.0 | |
ZoneLabs Integrity | =4.0 | |
Zonelabs ZoneAlarm | =4.0 | |
Zonelabs ZoneAlarm | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0309 is considered critical due to its potential for remote code execution.
To fix CVE-2004-0309, upgrade to Zone Labs ZoneAlarm version 4.5.538.001 or later, or ZoneLabs Integrity 4.0.146.046 or later.
CVE-2004-0309 affects Zone Labs ZoneAlarm versions before 4.5.538.001 and ZoneLabs Integrity versions before 4.0.146.046.
Yes, CVE-2004-0309 can be exploited remotely via a specially crafted SMTP message.
CVE-2004-0309 is a stack-based buffer overflow vulnerability.