Macallan IMAP Server Multiple Traversals Arbitrary File/Directory Manipulation

medium Nessus Plugin ID 20936

Synopsis

The remote IMAP server is affected by directory traversal vulnerabilities.

Description

The remote host is running Macallan Mail Solution, a mail server for Windows.

The IMAP server bundled with the version of Macallan installed on the remote host fails to filter directory traversal sequences from mailbox names passed to the 'CREATE', 'DELETE, 'RENAME', and 'SELECT' commands. An authenticated attacker can exploit these issues to gain access to sensitive information and more generally to manipulate arbitrary directories on the affected host.

Note that the software's IMAP server is part of the MCPop3 service, which runs with LOCAL SYSTEM privileges.

Solution

Upgrade to Macallan Mail Solution version 4.8.05.004 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2006-4/advisory/

Plugin Details

Severity: Medium

ID: 20936

File Name: macallan_imap_traversal.nasl

Version: 1.17

Type: remote

Family: Misc.

Published: 2/17/2006

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.8

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Information

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2/17/2006

Reference Information

CVE: CVE-2006-0798

BID: 16704