WinGate IMAP Server Directory Traversal Vulnerabilities

medium Nessus Plugin ID 22022

Synopsis

The remote IMAP server is prone to multiple directory traversal vulnerabilities.

Description

The remote host appears to be running WinGate, a Windows application for managing and securing Internet access.

The version of WinGate installed on the remote host fails to remove directory traversal sequences from the 'CREATE', 'SELECT', 'DELETE', 'RENAME', 'COPY', 'APPEND', and 'LIST' commands before using them to access messages. An authenticated attacker may be able to exploit this issue to read mail belong to other users and to create / rename / delete arbitrary directories on the affected system.

Solution

Upgrade to WinGate 6.1.4 Build 1099 or later.

See Also

http://secunia.com/secunia_research/2006-48/advisory/

http://forums.qbik.com/viewtopic.php?t=4215

Plugin Details

Severity: Medium

ID: 22022

File Name: wingate_614.nasl

Version: 1.16

Type: remote

Agent: windows

Family: Windows

Published: 7/11/2006

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Information

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 7/10/2006

Reference Information

CVE: CVE-2006-2917

BID: 18908