{"vuid":"VU#445313","idnumber":"445313","name":"602pro Lan Suite 2003 buffer overflow vulnerability","keywords":["602Pro Lan Suite","DoS","denial of service","long email addresses","1540 characters"],"overview":"602pro Lan Suite 2003 contains a buffer overflow vulnerability that may allow an attacker to execute code.","clean_desc":"602pro Lan Suite 2003 is a mail, firewall and proxy server that runs on the Microsoft Windows operating system. The 602pro Lan Suite 2003 SMTP server contains a buffer overflow vulnerability. To exploit this vulnerability, an attacker would need to send a specially crafted email through the SMTP component of a vulnerable server.","impact":"A remote unauthenticated attacker may be able to execute arbitrary code, or create a denial-of-service condition.","resolution":"Upgrade\nThe vendor has stated that this issue is addressed in 602 LAN Suite 2004.","workarounds":"Restrict access Disabling or restricting access to the SMTP server will mitigate this vulnerability. See the 602pro Lan Suite 2003 administrator manual for details on how to configure the SMTP service.","sysaffected":"","thanks":"Thanks to David Barker of Electrosonics for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://download.software602.com/pdf/lns/2003/ls2003_manual.pdf","http://www.software602.com/products/ls/","http://secunia.com/advisories/25429/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-05-29T16:44:07Z","publicdate":"2007-06-12T00:00:00Z","datefirstpublished":"2007-06-27T20:48:46Z","dateupdated":"2007-06-28T00:07:35Z","revision":22,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"2","cam_impact":"14","cam_easeofexploitation":"15","cam_attackeraccessrequired":"17","cam_scorecurrent":"2.94525","cam_scorecurrentwidelyknown":"3.48075","cam_scorecurrentwidelyknownexploited":"6.15825","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":2.94525,"vulnote":null}