sec-1-GFI-MailSecurity.txt...

- AV AC AU C I A
发布: 2005-10-13
修订: 2025-04-13

Sec-1 has identified an exploitable Buffer Overflow within the HTTP management interface of GFI MailSecurity 8.1. By sending large strings within several areas of the HTTP request (such as a large 'Host' or 'Accept' header) critical portions of memory are overwritten. Verification of this vulnerability can be achieved through the use of a HTTP fuzzer, such as @stake webproxy. Successful exploitation could allow an attacker to gain administrative control of the targeted host.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息