ArGoSoft Mail Server Multiple Remote Vulnerabilities (XSS, DoS, Traversal)

high Nessus Plugin ID 11659

Language:

Synopsis

The remote host is running a mail server that is affected by multiple remote vulnerabilities.

Description

The remote host is running the ArGoSoft WebMail interface. The version found on the remote host is reportedly affected by multiple remote vulnerabilities :

- A directory traversal vulnerability could allow remote users access to all files on the host.

- A denial of service vulnerability exists which could allow remote attackers with regular user privileges to create a mail-loop condition that will consume all system resources.

- A HTML injection vulnerability caused by a failure to properly sanitize HTML from email messages.

- An authentication bypass vulnerability due to the free-ware version of ArGoSoft failing to carry out sufficient authentication before granting access to the user management interface.

- A denial of service vulnerability in the free-ware version. An attacker can exploit this by attempting to create a new user using a name of excessive length.

*** Nessus solely relied on the banner of this service to issue
*** this alert.

Solution

Upgrading to ArGoSoft 1.8.3.5 or newer reportedly fixes the issue.

See Also

https://seclists.org/bugtraq/2002/Oct/89

https://seclists.org/bugtraq/2002/Aug/82

https://www.argosoft.com/rootpages/MailServer/ChangeList.aspx

Plugin Details

Severity: High

ID: 11659

File Name: argosoft_multiple_flaws.nasl

Version: 1.20

Type: remote

Family: CGI abuses

Published: 5/28/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/4/2002

Reference Information

CVE: CVE-2002-1004, CVE-2002-1005, CVE-2002-1893

BID: 5144, 5395, 5906, 7608, 7610