WinGate IMAP Server Directory Traversal Vulnerabilities

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is prone to multiple directory traversal
vulnerabilities.

Description :

The remote host appears to be running WinGate, a Windows application
for managing and securing Internet access.

The version of WinGate installed on the remote host fails to remove
directory traversal sequences from the 'CREATE', 'SELECT', 'DELETE',
'RENAME', 'COPY', 'APPEND', and 'LIST' commands before using them to
access messages. An authenticated attacker may be able to exploit
this issue to read mail belong to other users and to create / rename /
delete arbitrary directories on the affected system.

See also :

http://secunia.com/secunia_research/2006-48/advisory/
http://forums.qbik.com/viewtopic.php?t=4215

Solution :

Upgrade to WinGate 6.1.4 Build 1099 or later.

Risk factor :

Medium / CVSS Base Score : 5.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N)
CVSS Temporal Score : 5.2
(CVSS2#E:F/RL:U/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 22022 ()

Bugtraq ID: 18908

CVE ID: CVE-2006-2917

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now