Thread-topic: [SA19491] McAfee WebShield SMTP Format String Vulnerability
>
> TITLE:
> McAfee WebShield SMTP Format String Vulnerability
>
> SECUNIA ADVISORY ID:
> SA19491
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/19491/
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> McAfee WebShield SMTP 4.x
> http://secunia.com/product/228/
>
> DESCRIPTION:
> Ollie Whitehouse has reported a vulnerability in McAfee WebShield
> SMTP, which can be exploited by malicious people to compromise a
> vulnerable system.
>
> The vulnerability is caused due to a format string error within the
> construction of bounce messages for non-existent domains and can be
> exploited by passing a specially crafted original destination
> address.
>
> Successful exploitation allows execution of arbitrary code.
>
> The vulnerability has been reported in version 4.5 MR1a on the
> Windows platform.
>
> SOLUTION:
> Apply patch P0803 (reportedly released in August 2003) or update to
> version 4.5 MR2.
>
> PROVIDED AND/OR DISCOVERED BY:
> Ollie Whitehouse, Symantec.
>