Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message.
                
            References
                    | Link | Resource | 
|---|---|
| ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I | Patch | 
| http://www.cert.org/advisories/CA-2001-25.html | US Government Resource | 
| http://www.kb.cert.org/vuls/id/206723 | Patch US Government Resource | 
| http://www.securityfocus.com/bid/3290 | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/7088 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Information
                Published : 2001-09-03 21:00
Updated : 2017-07-10 18:29
NVD link : CVE-2001-1456
Mitre link : CVE-2001-1456
JSON object : View
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
                network_associates
- mcafee_e-ppliance
- gauntlet_firewall
mcafee
- webshield_smtp
pgp
- e-ppliance_300
sgi
- irix


