Macallan IMAP Server Multiple Traversals Arbitrary File/Directory Manipulation

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote IMAP server is affected by directory traversal

Description :

The remote host is running Macallan Mail Solution, a mail server for

The IMAP server bundled with the version of Macallan installed on the
remote host fails to filter directory traversal sequences from mailbox
names passed to the 'CREATE', 'DELETE, 'RENAME', and 'SELECT'
commands. An authenticated attacker can exploit these issues to gain
access to sensitive information and more generally to manipulate
arbitrary directories on the affected host.

Note that the software's IMAP server is part of the MCPop3 service,
which runs with LOCAL SYSTEM privileges.

See also :

Solution :

Upgrade to Macallan Mail Solution version or later.

Risk factor :

Medium / CVSS Base Score : 5.5
CVSS Temporal Score : 4.5
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 20936 (macallan_imap_traversal.nasl)

Bugtraq ID: 16704

CVE ID: CVE-2006-0798

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now