cpe:/a:mcafee:webshield_smtp:4.0 cpe:/a:mcafee:webshield_smtp:4.1 cpe:/a:network_associates:gauntlet_firewall:4.2 cpe:/a:network_associates:gauntlet_firewall:unix_5.0 cpe:/a:network_associates:gauntlet_firewall:unix_5.5 cpe:/a:network_associates:gauntlet_firewall:unix_6.0 cpe:/h:network_associates:mcafee_e-ppliance:100_series cpe:/h:network_associates:mcafee_e-ppliance:120_series cpe:/h:pgp:e-ppliance_300:1.0 cpe:/h:pgp:e-ppliance_300:1.5 cpe:/h:pgp:e-ppliance_300:2.0 cpe:/o:sgi:irix:6.2 cpe:/o:sgi:irix:6.3 cpe:/o:sgi:irix:6.4 cpe:/o:sgi:irix:6.5 CVE-2001-1456 2001-09-04T00:00:00.000-04:00 2017-07-10T21:29:08.197-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2004-01-01T00:00:00.000-05:00 SGI 20011104-01-I BID 3290 CERT CA-2001-25 CERT-VN VU#206723 XF gauntlet-csmap-bo(7088) Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message.