Ipswitch IMail Server 11.x / 12.x < 12.4.1.15 Multiple Vulnerabilities (Heartbleed)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote mail server is potentially affected by multiple
vulnerabilities.

Description :

The remote host appears to be running Ipswitch IMail Server 11.x or
12.x older than version 12.4.1.15 and is, therefore, potentially
affected by the following vulnerabilities :

- An error exists related to the implementation of the
Elliptic Curve Digital Signature Algorithm (ECDSA) that
could allow nonce disclosure via the 'FLUSH+RELOAD'
cache side-channel attack. (CVE-2014-0076)

- An out-of-bounds read error, known as the 'Heartbleed
Bug', exists related to handling TLS heartbeat
extensions that could allow an attacker to obtain
sensitive information such as primary key material,
secondary key material and other protected content.
(CVE-2014-0160)

- Multiple input validation errors exist related to the
'WebClient' component that could allow cross-site
scripting attacks. (CVE-2014-3878)

See also :

http://www.nessus.org/u?0313fdff
http://www.nessus.org/u?61f33454
http://www.heartbleed.com
https://eprint.iacr.org/2014/140
https://www.openssl.org/news/vulnerabilities.html#2014-0160
https://www.openssl.org/news/secadv/20140407.txt

Solution :

Upgrade to Ipswitch IMail Server version 12.4.1.15 or later.

Risk factor :

High / CVSS Base Score : 9.4
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N)
CVSS Temporal Score : 8.5
(CVSS2#E:POC/RL:U/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 76490 ()

Bugtraq ID: 66363
66690
67830

CVE ID: CVE-2014-0076
CVE-2014-0160
CVE-2014-3878

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now