First published: Thu Oct 20 2005(Updated: )
Buffer overflow in the HTTP management interface for GFI MailSecurity 8.1 allows remote attackers to execute arbitrary code via long headers such as (1) Host and (2) Accept in HTTP requests. NOTE: the vendor suggests that this issues is "in an underlying Microsoft technology" which, if true, could mean that the overflow affects other products as well.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GFI MailSecurity | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3182 is classified as a high severity vulnerability due to potential remote code execution risks.
To remediate CVE-2005-3182, upgrade to the latest version of GFI MailSecurity that addresses this buffer overflow vulnerability.
CVE-2005-3182 specifically affects GFI MailSecurity version 8.1 running with Exchange SMTP.
CVE-2005-3182 can be exploited via HTTP requests containing maliciously crafted long headers.
Yes, there are known exploit techniques that leverage the buffer overflow in CVE-2005-3182 to execute arbitrary code remotely.