Agnitum Outpost Security Suite < 6.5.2358.316.0607 Detection Engine Bypass

medium Nessus Network Monitor Plugin ID 4604

Synopsis

The remote host is missing a critical security patch or upgrade.

Description

The remote client is running the Agnitum Outpost security suite. This suite of tools protects users from viruses, phishing attacks, malware and more.

The vendor has reported an issue where specially formatted file names may bypass the detection engines. An attacker exploiting this flaw would need to be able to convince an Outpost user to open a malicious file. Successful exploitation would result in the attacker bypassing the security rules and passing a malicious file to the client.

Solution

Upgrade to version 6.5.2358.316.0607 or higher.

See Also

http://www.agnitum.com/products/security-suite/history.php

Plugin Details

Severity: Medium

ID: 4604

Family: Web Clients

Published: 7/23/2008

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Reference Information

BID: 30347