CVE-2007-1792
https://notcve.org/view.php?id=CVE-2007-1792
libdayzero.dll in the Filter Hub Service (filter-hub.exe) in Symantec Mail Security for SMTP before 5.0.1 Patch 181 and Mail Security Appliance before 5.0.0-36 allows remote attackers to cause a denial of service (crash) via a crafted executable attachment in an e-mail, involving the detection of "PE-Shield v0.2" and "ASPack v1.00-1.08.02". libdayzero.dll en el servicio Filter Hub (filter-hub.exe) en Symantec Mail Security para SMTP anterior a 5.0.1 Patch 181 y Mail Security Appliance anterior a 5.0.0-36 permite a atacantes remotos provocar denegación de servicio (caida) a través de adjuntos ejecutables manipulados en un e-mail, afectando a la detección de "PE-Shield v0.2" y "ASPack v1.00-1.08.02". • http://osvdb.org/36110 http://secunia.com/advisories/24632 http://secunia.com/secunia_research/2007-48/advisory http://securityresponse.symantec.com/avcenter/security/Content/2007.06.26.html http://www.securityfocus.com/archive/1/472440/100/0/threaded http://www.securityfocus.com/bid/24625 http://www.securitytracker.com/id?1018301 http://www.vupen.com/english/advisories/2007/2335 https://exchange.xforce.ibmcloud.com/vulnerabilities/35105 •
CVE-2007-1252
https://notcve.org/view.php?id=CVE-2007-1252
Buffer overflow in Symantec Mail Security for SMTP 5.0 before Patch 175 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted headers in an e-mail message. NOTE: some information was obtained from third party sources. Desbordamiento de búfer en Symantec Mail Security para SMTP 5.0 anterior a Patch 175 permite a atacantes remotos provocar denegación de servicio (caida) y posiblemente ejecutar código de su elección a través de cabeceras manipuladas en un mensaje e-mail. NOTA: algunas de estas informaciones se obtuvieron de terceras fuentes de información. • ftp://ftp.symantec.com/public/english_us_canada/products/symantec_mail_security/5.0_smtp/updates/release_notes_p175.txt http://osvdb.org/33840 http://secunia.com/advisories/24371 http://www.kb.cert.org/vuls/id/875633 http://www.securityfocus.com/bid/22782 http://www.securitytracker.com/id?1017716 http://www.vupen.com/english/advisories/2007/0799 https://exchange.xforce.ibmcloud.com/vulnerabilities/32781 •
CVE-2006-5545
https://notcve.org/view.php?id=CVE-2006-5545
Premium Antispam in Symantec Mail Security for Domino Server 5.1.x before 5.1.2.28 does not filter certain SMTP address formats, which allows remote attackers to use the product as a spam relay. Premium Antispam de Symantec Mail Security para Domino Server 5.1.x anterioers a 5.1.2.28 no filtra formatos de direcciones SMTP concretas, que permite a atacantes remotos utilizar el producto como un retransmisor de correo no deseado (spam). • http://secunia.com/advisories/22490 http://securityresponse.symantec.com/avcenter/security/Content/2006.10.19.html http://securitytracker.com/id?1017094 http://www.osvdb.org/29895 http://www.securityfocus.com/bid/19866 http://www.vupen.com/english/advisories/2006/4118 https://exchange.xforce.ibmcloud.com/vulnerabilities/29676 •
CVE-2005-1346
https://notcve.org/view.php?id=CVE-2005-1346
Multiple Symantec AntiVirus products, including Norton AntiVirus 2005 11.0.0, Web Security Web Security 3.0.1.72, Mail Security for SMTP 4.0.5.66, AntiVirus Scan Engine 4.3.7.27, SAV/Filter for Domino NT 3.1.1.87, and Mail Security for Exchange 4.5.4.743, when running on Windows, allows remote attackers to cause a denial of service (component crash) and avoid detection via a crafted RAR file. • http://securityresponse.symantec.com/avcenter/security/Content/2005.04.27.html •
CVE-2005-0249
https://notcve.org/view.php?id=CVE-2005-0249
Heap-based buffer overflow in the DEC2EXE module for Symantec AntiVirus Library allows remote attackers to execute arbitrary code via a UPX compressed file containing a negative virtual offset to a crafted PE header. • http://securitytracker.com/id?1013133 http://www.kb.cert.org/vuls/id/107822 http://www.symantec.com/avcenter/security/Content/2005.02.08.html http://xforce.iss.net/xforce/alerts/id/187 https://exchange.xforce.ibmcloud.com/vulnerabilities/18869 •