Citadel SMTP RCPT TO Remote Buffer Overflow
Publish Date: 15 février 2011
Gravité: : Faible
Identifiant(s) CVE: : CVE-2008-0394
Date du conseil: 15 février 2011
Description
Buffer overflow in Citadel SMTP server 7.10 and earlier allows
remote attackers to execute arbitrary code via a long RCPT TO command, which is
not properly handled by the makeuserkey function. NOTE: some of these details
were obtained from third party information.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1002531
Trend Micro Deep Security DPI Rule Name: 1002531 - Citadel SMTP RCPT TO Remote Buffer Overflow
Affected software and version:
- Citadel Citadel_SMTP 7.10