Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com.
A remote overflow exists in WebShield SMTP. The product fails to validate input to the SET_CONFIG command resulting in a buffer overflow. With a
specially crafted request exceeding 208 bytes, an attacker can cause the execution of arbitrary code resulting in a loss of integrity.
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds:
1. Run the service as a restricted user, not with SYSTEM privileges.
2. Use access controls to restrict access to port 9999