Vulnerabilities > CVE-1999-1529 - Unspecified vulnerability in Trend Micro Interscan Viruswall 3.23/3.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an attacker to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description Trend Micro InterScan VirusWall 3.2.3/3.3 Long HELO Buffer Overflow Vulnerability (2). CVE-1999-1529 ,CVE-2001-0679. Remote exploit for windows platform id EDB-ID:19614 last seen 2016-02-02 modified 1999-11-07 published 1999-11-07 reporter dark spyrit source https://www.exploit-db.com/download/19614/ title Trend Micro InterScan VirusWall 3.2.3/3.3 Long HELO Buffer Overflow Vulnerability 2 description Trend Micro InterScan VirusWall 3.2.3/3.3 Long HELO Buffer Overflow Vulnerability (1). CVE-1999-1529 ,CVE-2001-0679. Remote exploit for windows platform id EDB-ID:19612 last seen 2016-02-02 modified 1999-11-07 published 1999-11-07 reporter Alain Thivillon & Stephane Aubert source https://www.exploit-db.com/download/19612/ title Trend Micro InterScan VirusWall 3.2.3/3.3 Long HELO Buffer Overflow Vulnerability 1
Nessus
NASL family | SMTP problems |
NASL id | INTERSCAN_DOS.NASL |
description | It was possible to perform a denial of service against the remote Interscan SMTP server by sending it a special long HELO command. This problem allows an attacker to prevent your Interscan SMTP server from handling requests. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10353 |
published | 2000-04-17 |
reporter | This script is Copyright (C) 2000-2018 Renaud Deraison and Alain Thivillon |
source | https://www.tenable.com/plugins/nessus/10353 |
title | Trend Micro InterScan 3.32 SMTP HELO Command Remote Overflow DoS |
References
- http://marc.info/?l=bugtraq&m=94201512111092&w=2
- http://marc.info/?l=bugtraq&m=94201512111092&w=2
- http://marc.info/?l=bugtraq&m=94204166130782&w=2
- http://marc.info/?l=bugtraq&m=94204166130782&w=2
- http://marc.info/?l=bugtraq&m=94210427406568&w=2
- http://marc.info/?l=bugtraq&m=94210427406568&w=2
- http://marc.info/?l=ntbugtraq&m=94199707625818&w=2
- http://marc.info/?l=ntbugtraq&m=94199707625818&w=2
- http://marc.info/?l=ntbugtraq&m=94208143007829&w=2
- http://marc.info/?l=ntbugtraq&m=94208143007829&w=2
- http://www.securityfocus.com/archive/1/55551
- http://www.securityfocus.com/archive/1/55551
- http://www.securityfocus.com/bid/787
- http://www.securityfocus.com/bid/787
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3465
- https://exchange.xforce.ibmcloud.com/vulnerabilities/3465