Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SMTP problems >> ASN.1 Parsing Vulnerabilities (SMTP check)


Vulnerability Assessment Details

ASN.1 Parsing Vulnerabilities (SMTP check)

Vulnerability Assessment Summary
Checks if the remote host has a patched ASN.1 decoder (828028)

Detailed Explanation for this Vulnerability Assessment

The remote Windows host has a ASN.1 library which is vulnerable to a
flaw which could permit a possible hacker to execute arbitrary code on this host.

To exploit this flaw, a possible hacker would need to send a specially crafted
ASN.1 encoded packet with improperly advertised lengths.

This particular check sent a malformed SMTP authorization packet and acertaind that
the remote host is not patched.

Solution : http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx
Network Security Threat Level: High

Networks Security ID: 9633, 9635, 9743, 13300

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

***Vintage Dell XPS M233s, Windows 95, Intel Pentium 233MHz, 32MB RAM***
$50.0
***Vintage Dell XPS M233s, Windows 95, Intel Pentium 233MHz, 32MB RAM*** pictureRare Vintage IBM PC Jr model 4860 in Box with Keyboard 1983
$99.99
Rare Vintage IBM PC Jr model 4860 in Box with Keyboard 1983 pictureWestern Digital WD800JD 80GB 7200RPM 3.5" vintage SATA HDD [VGC/Tested]
$20.0
Western Digital WD800JD 80GB 7200RPM 3.5Western Digital WD800JD 80GB 7200RPM 3.5" vintage SATA HDD [VGC/Tested]
$20.0
Western Digital WD800JD 80GB 7200RPM 3.5


Discussions

No Discussions have been posted on this vulnerability.