McAfee Email Gateway File Attachment Name NULL Character Handling Filter Bypass (SB10161)

Medium Nessus Plugin ID 91991


An email proxy server running on the remote host is affected by a filter bypass vulnerability.


The McAfee Email Gateway (MEG) application running on the remote host is affected by a flaw when processing email file attachments due to a failure to remove NULL characters from the raw header value before it is decoded. An unauthenticated, remote attacker can exploit this, via a crafted file attachment, to bypass file filters and send arbitrary files to the recipient.


Apply the relevant hotfix referenced in the vendor advisory.

See Also

Plugin Details

Severity: Medium

ID: 91991

File Name: mcafee_email_gateway_SB10161.nasl

Version: $Revision: 1.2 $

Type: local

Family: Misc.

Published: 2016/07/11

Modified: 2016/07/13

Dependencies: 73224

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:mcafee:email_gateway

Required KB Items: Host/McAfeeSMG/name, Host/McAfeeSMG/version, Host/McAfeeSMG/patches

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/06/07

Vulnerability Publication Date: 2016/06/09

Reference Information

OSVDB: 139934