Описание
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.
Ссылки
- Third Party AdvisoryUS Government Resource
- Vendor Advisory
- Third Party AdvisoryUS Government Resource
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:zonelabs:integrity:4.0:*:*:*:*:*:*:*
cpe:2.3:a:zonelabs:zonealarm:4.0:*:*:*:*:*:*:*
cpe:2.3:a:zonelabs:zonealarm:4.0:*:plus:*:*:*:*:*
cpe:2.3:a:zonelabs:zonealarm:4.0:*:pro:*:*:*:*:*
cpe:2.3:a:zonelabs:zonealarm:4.5:*:pro:*:*:*:*:*
EPSS
Процентиль: 96%
0.2669
Средний
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.
EPSS
Процентиль: 96%
0.2669
Средний
10 Critical
CVSS2
Дефекты
NVD-CWE-Other