This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Windows host has a program that is prone to a directory
The remote host is running MailMarshal, a mail server for Windows.
According to the registry, the installation of MailMarshal on the
remote Windows host fails to properly sanitize file names when
unpacking tar files. A remote attacker may be able to leverage this
issue to overwrite files and execute arbitrary code. Further, since
the application operates with SYSTEM privileges, this could lead to a
complete compromise of the affected system.
See also :
Apply the appropriate patch for MailMarshal SMTP or MailMarshal
Exchange as described in the vendor advisory.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true