McAfee Email Gateway File Attachment Name NULL Character Handling Filter Bypass (SB10161)

medium Nessus Plugin ID 91991

Synopsis

An email proxy server running on the remote host is affected by a filter bypass vulnerability.

Description

The McAfee Email Gateway (MEG) application running on the remote host is affected by a flaw when processing email file attachments due to a failure to remove NULL characters from the raw header value before it is decoded. An unauthenticated, remote attacker can exploit this, via a crafted file attachment, to bypass file filters and send arbitrary files to the recipient.

Solution

Apply the relevant hotfix referenced in the vendor advisory.

See Also

https://kc.mcafee.com/corporate/index?page=content&id=SB10161

Plugin Details

Severity: Medium

ID: 91991

File Name: mcafee_email_gateway_SB10161.nasl

Version: 1.4

Type: local

Family: Misc.

Published: 7/11/2016

Updated: 8/8/2018

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:email_gateway

Required KB Items: Host/McAfeeSMG/name, Host/McAfeeSMG/version, Host/McAfeeSMG/patches

Patch Publication Date: 6/7/2016

Vulnerability Publication Date: 6/9/2016

Reference Information

MCAFEE-SB: SB10161