CVE-2004-0309
Summary
| CVE | CVE-2004-0309 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-11-23 05:00:00 UTC |
| Updated | 2017-10-10 01:30:00 UTC |
| Description | Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Zonelabs | Integrity | 4.0 | All | All | All |
| Application | Zonelabs | Integrity | 4.0 | All | All | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | All | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | plus | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | pro | All |
| Application | Zonelabs | Zonealarm | 4.5 | All | pro | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | All | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | plus | All |
| Application | Zonelabs | Zonealarm | 4.0 | All | pro | All |
| Application | Zonelabs | Zonealarm | 4.5 | All | pro | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Zone Labs: Security Alert | CONFIRM | download.zonelabs.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| O-084 | CIAC | www.ciac.org | |
| US-CERT Vulnerability Note VU#619982 | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| 3991 | OSVDB | www.osvdb.org | |
| Zone Labs ZoneAlarm SMTP Remote Buffer Overflow Vulnerability | BID | www.securityfocus.com | Vendor Advisory |
| 'EEYE: ZoneLabs SMTP Processing Buffer Overflow' - MARC | BUGTRAQ | marc.info | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.