MDaemon < 8.1.0 Content Filter Traversal Arbitrary File Overwrite

critical Nessus Network Monitor Plugin ID 3151

Synopsis

The remote host is vulnerable to a directory traversal flaw.

Description

The remote host is running Alt-N MDaemon, an SMTP/IMAP server for Windows. According to its banner, the version of MDaemon on the remote host is prone to a directory traversal flaw that can be exploited to overwrite files outside the application's quarantine directory provided MDaemon's attachment quarantine feature is enabled.

Solution

Upgrade to version 8.1.0 or higher.

See Also

http://files.altn.com/MDaemon/Release/RelNotes_en.txt

Plugin Details

Severity: Critical

ID: 3151

Family: Web Servers

Published: 7/27/2005

Updated: 3/6/2019

Nessus ID: 19310

Risk Information

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Reference Information

BID: 14400