ArGoSoft Mail Server < 1.8.8.6 '_DUMP' Information Disclosure

Medium Nessus Network Monitor Plugin ID 3447

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running the ArGoSoft Mail Server. This version of ArGoSoft is prone to a remote unauthenticated access flaw. Specifically, as ArGoSoft does not require authentication prior to allowing the _DUMP directive, an unauthenticated user can cause the server to disclose potentially confidential data. Successful exploitation would give the attacker confidential server data.

Secondly, the remote host is vulnerable to a directory traversal flaw within its IMAP component. An attacker exploiting this flaw would need to be authenticated. Successful exploitation would result in the attacker accessing confidential data outside of their default IMAP folder.

Thirdly, the remote server is vulnerable to an HTML Injeciton attack.

Solution

Upgrade to version 1.8.8.6 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2006-02/0439.html

http://www.argosoft.com/rootpages/mailserver/ChangeList.aspx

http://www.argosoft.com/applications/mailserver

Plugin Details

Severity: Medium

ID: 3447

Family: SMTP Servers

Published: 2006/02/25

Modified: 2016/01/21

Dependencies: 2004, 2005

Nessus ID: 20977

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

CVSSv3

Base Score: 5.3

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:F/RL:U/RC:X

Reference Information

CVE: CVE-2006-0978, CVE-2006-0929, CVE-2006-0928

BID: 16808, 16834, 16809