Vulnerability Description
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Interscan Viruswall | 3.3 |
References
- http://marc.info/?l=bugtraq&m=94204166130782&w=2
- http://marc.info/?l=ntbugtraq&m=94208143007829&w=2
- http://marc.info/?l=ntbugtraq&m=94216491202063&w=2
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3465
- http://marc.info/?l=bugtraq&m=94204166130782&w=2
- http://marc.info/?l=ntbugtraq&m=94208143007829&w=2
- http://marc.info/?l=ntbugtraq&m=94216491202063&w=2
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331ExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3465
FAQ
What is CVE-2001-0679?
CVE-2001-0679 is a vulnerability with a CVSS score of 10.0 (HIGH). A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server.
How severe is CVE-2001-0679?
CVE-2001-0679 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0679?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Interscan Viruswall.