McAfee Email Gateway File Attachment Name NULL Character Handling Filter Bypass (SB10161)

medium Nessus Plugin ID 91991


An email proxy server running on the remote host is affected by a filter bypass vulnerability.


The McAfee Email Gateway (MEG) application running on the remote host is affected by a flaw when processing email file attachments due to a failure to remove NULL characters from the raw header value before it is decoded. An unauthenticated, remote attacker can exploit this, via a crafted file attachment, to bypass file filters and send arbitrary files to the recipient.


Apply the relevant hotfix referenced in the vendor advisory.

See Also

Plugin Details

Severity: Medium

ID: 91991

File Name: mcafee_email_gateway_SB10161.nasl

Version: 1.4

Type: local

Family: Misc.

Published: 7/11/2016

Updated: 8/8/2018

Risk Information


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:email_gateway

Required KB Items: Host/McAfeeSMG/name, Host/McAfeeSMG/version, Host/McAfeeSMG/patches

Patch Publication Date: 6/7/2016

Vulnerability Publication Date: 6/9/2016

Reference Information