PGP SIGNED MESSAGE-----
CA-2001-25 Buffer Overflow in Gauntlet Firewall allows
intruders to execute arbitrary code
release date: September 06, 2001
Last revised: --
revision history can be found at the end of this file.
running the following products that use Gauntlet Firewall
for Unix versions 5.x
* PGP e-ppliance 300 series version 1.0
* McAfee e-ppliance 100 and 120 series
* Gauntlet for Unix version 6.0
* PGP e-ppliance 300 series versions 1.5, 2.0
* PGP e-ppliance 1000 series versions 1.5, 2.0
* McAfee WebShield for Solaris v4.1
for a remotely exploitable buffer overflow exists
in Gauntlet Firewall by PGP Security.
overflow occurs in the smap/smapd and CSMAP daemons.
According to PGP Security, these daemons are responsible for
handling email transactions for both inbound and outbound email.
04, 2001, PGP Security released a security bulletin
and patches for this vulnerability. For more information, please
can execute arbitrary code with the privileges of the
corresponding daemon. Additionally, firewalls often have trust
relationships with other network devices. An intruder who
compromises a firewall may be able to leverage this trust to
compromise other devices on the network or to make changes to the
A contains information provided by vendors for this
advisory. We will update the appendix as we receive more
information. If you do not see your vendor's name, the CERT/CC did
not hear from that vendor. Please contact your vendor directly.
A. - Vendor Information
contains information provided by vendors for this
advisory. When vendors report new information to the CERT/CC, we
update this section and note the changes in our revision
history. If a particular vendor is not listed below, we have not
received their comments.
has published a security advisory describing this
vulnerability as well as patches. This is available from
Coordination Center thanks PGP Security for their
advisory, on which this document is based.
on this document can be directed to the author, Ian A. Finlay.
is available from:
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
personnel answer the hotline 08:00-17:00 EST(GMT-5) /
EDT(GMT-4) Monday through Friday; they are on call for emergencies
during other hours, on U.S. holidays, and on weekends.
urge you to encrypt sensitive information sent by
email. Our public PGP key is available from
prefer to use DES, please call the CERT hotline for more
and other security information are available from
our web site
to the CERT mailing list for advisories and bulletins,
send email to email@example.com. Please include in the body of
and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office.
furnished by Carnegie Mellon University and the
Software Engineering Institute is furnished on an "as is"
basis. Carnegie Mellon University makes no warranties of any kind,
either expressed or implied as to any matter including, but not
limited to, warranty of fitness for a particular purpose or
merchantability, exclusivity or results obtained from use of the
material. Carnegie Mellon University does not make any warranty of
any kind with respect to freedom from patent, trademark, or
for use, disclaimers, and sponsorship information
2001 Carnegie Mellon University.
September 06, 2001: Initial release
Version: PGPfreeware 5.0i for non-commercial use
-----END PGP SIGNATURE-----