Macallan IMAP Server Multiple Traversals Arbitrary File/Directory Manipulation

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is affected by directory traversal
vulnerabilities.

Description :

The remote host is running Macallan Mail Solution, a mail server for
Windows.

The IMAP server bundled with the version of Macallan installed on the
remote host fails to filter directory traversal sequences from mailbox
names passed to the 'CREATE', 'DELETE, 'RENAME', and 'SELECT'
commands. An authenticated attacker can exploit these issues to gain
access to sensitive information and more generally to manipulate
arbitrary directories on the affected host.

Note that the software's IMAP server is part of the MCPop3 service,
which runs with LOCAL SYSTEM privileges.

See also :

http://secunia.com/secunia_research/2006-4/advisory/

Solution :

Upgrade to Macallan Mail Solution version 4.8.05.004 or later.

Risk factor :

Medium / CVSS Base Score : 5.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N)
CVSS Temporal Score : 4.5
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 20936 (macallan_imap_traversal.nasl)

Bugtraq ID: 16704

CVE ID: CVE-2006-0798