ArGoSoft Mail Server < 1.8.8.6 '_DUMP' Information Disclosure

medium Nessus Network Monitor Plugin ID 3447

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running the ArGoSoft Mail Server. This version of ArGoSoft is prone to a remote unauthenticated access flaw. Specifically, as ArGoSoft does not require authentication prior to allowing the _DUMP directive, an unauthenticated user can cause the server to disclose potentially confidential data. Successful exploitation would give the attacker confidential server data.

Secondly, the remote host is vulnerable to a directory traversal flaw within its IMAP component. An attacker exploiting this flaw would need to be authenticated. Successful exploitation would result in the attacker accessing confidential data outside of their default IMAP folder.

Thirdly, the remote server is vulnerable to an HTML Injeciton attack.

Solution

Upgrade to version 1.8.8.6 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2006-02/0439.html

http://www.argosoft.com/rootpages/mailserver/ChangeList.aspx

http://www.argosoft.com/applications/mailserver

Plugin Details

Severity: Medium

ID: 3447

Family: SMTP Servers

Published: 2/25/2006

Updated: 3/6/2019

Nessus ID: 20977

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:argosoft:argosoft_mail_server

Reference Information

CVE: CVE-2006-0928, CVE-2006-0929, CVE-2006-0978

BID: 16808, 16834, 16809