This script is Copyright (C) 2016 Tenable Network Security, Inc.
An email proxy server running on the remote host is affected by a
filter bypass vulnerability.
The McAfee Email Gateway (MEG) application running on the remote host
is affected by a flaw when processing email file attachments due to a
failure to remove NULL characters from the raw header value before it
is decoded. An unauthenticated, remote attacker can exploit this, via
a crafted file attachment, to bypass file filters and send arbitrary
files to the recipient.
See also :
Apply the relevant hotfix referenced in the vendor advisory.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now