ID

VAR-201208-0453


CVE

CVE-2012-4581


TITLE

McAfee Email and Web Security and McAfee Email Gateway Vulnerable to session hijacking

Trust: 0.8

sources: JVNDB: JVNDB-2012-003818

DESCRIPTION

McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue. McAfee Email and Web Security Appliance and Email Gateway are prone to a cross-site scripting vulnerability, multiple information-disclosure vulnerabilities, a directory-traversal vulnerability, a security-bypass vulnerability, and an insecure-encryption vulnerability. A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process. Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions. Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application. Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. McAfee Email Gateway (MEG) is a suite of email security solutions from McAfee. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: McAfee Email and Web Security Appliance and Email Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48406 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48406/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48406/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48406/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) An error in the reset password functionality can be exploited to reset the password of administrative users. 3) An error within the Dashboard discloses active session tokens and can be exploited to hijack another user's session. 4) The system backup stores passwords with weak encryption and can be exploited to decrypt the passwords via brute force attacks. 5) Certain unspecified input is not properly verified before being used to download files. This can be exploited to download arbitrary files from local resources via directory traversal sequences. 6) An unspecified error can be exploited to disclose the contents of files. Note: A weakness due to the server-side session remaining active has also been reported. SOLUTION: Update to a fixed version: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure ORIGINAL ADVISORY: https://kc.mcafee.com/corporate/index?page=content&id=SB10020 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-4581 // JVNDB: JVNDB-2012-003818 // BID: 52487 // VULHUB: VHN-57862 // VULMON: CVE-2012-4581 // PACKETSTORM: 110786

AFFECTED PRODUCTS

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 1.9

vendor:mcafeemodel:email and web securityscope:eqversion:5.0

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.5

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.6

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:ltversion:5.x

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:ltversion:5.6

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:5.5 patch 6

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:patch 1

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:ltversion:7.0

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:patch 3

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:6.7.1

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:eqversion:5.14

Trust: 0.3

vendor:mcafeemodel:email and web security appliancescope:eqversion:5.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:neversion:7.01

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.63

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.56

Trust: 0.3

sources: BID: 52487 // JVNDB: JVNDB-2012-003818 // CNNVD: CNNVD-201208-400 // NVD: CVE-2012-4581

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4581
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4581
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-400
value: MEDIUM

Trust: 0.6

VULHUB: VHN-57862
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-4581
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4581
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-57862
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57862 // VULMON: CVE-2012-4581 // JVNDB: JVNDB-2012-003818 // CNNVD: CNNVD-201208-400 // NVD: CVE-2012-4581

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-57862 // JVNDB: JVNDB-2012-003818 // NVD: CVE-2012-4581

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-400

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201208-400

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003818

PATCH

title:SB10020url:https://kc.mcafee.com/corporate/index?page=content&id=SB10020

Trust: 0.8

sources: JVNDB: JVNDB-2012-003818

EXTERNAL IDS

db:NVDid:CVE-2012-4581

Trust: 2.6

db:MCAFEEid:SB10020

Trust: 2.2

db:BIDid:52487

Trust: 0.9

db:JVNDBid:JVNDB-2012-003818

Trust: 0.8

db:CNNVDid:CNNVD-201208-400

Trust: 0.7

db:CNNVDid:CNNVD-201203-306

Trust: 0.6

db:SECUNIAid:48406

Trust: 0.2

db:VULHUBid:VHN-57862

Trust: 0.1

db:VULMONid:CVE-2012-4581

Trust: 0.1

db:PACKETSTORMid:110786

Trust: 0.1

sources: VULHUB: VHN-57862 // VULMON: CVE-2012-4581 // BID: 52487 // JVNDB: JVNDB-2012-003818 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-400 // NVD: CVE-2012-4581

REFERENCES

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4581

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4581

Trust: 0.8

url:http://www.securityfocus.com/bid/52487

Trust: 0.6

url:http://www.mcafee.com/uk/products/email-and-web-security-appliance.aspx

Trust: 0.3

url:http://www.mcafee.com/us/products/email-gateway.aspx

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/48406/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48406/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48406

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57862 // VULMON: CVE-2012-4581 // BID: 52487 // JVNDB: JVNDB-2012-003818 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-400 // NVD: CVE-2012-4581

CREDITS

Ben Williams of NGS Secure

Trust: 0.9

sources: BID: 52487 // CNNVD: CNNVD-201203-306

SOURCES

db:VULHUBid:VHN-57862
db:VULMONid:CVE-2012-4581
db:BIDid:52487
db:JVNDBid:JVNDB-2012-003818
db:PACKETSTORMid:110786
db:CNNVDid:CNNVD-201203-306
db:CNNVDid:CNNVD-201208-400
db:NVDid:CVE-2012-4581

LAST UPDATE DATE

2025-04-11T22:49:26.401000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57862date:2012-08-22T00:00:00
db:VULMONid:CVE-2012-4581date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003818date:2012-08-24T00:00:00
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-400date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4581date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-57862date:2012-08-22T00:00:00
db:VULMONid:CVE-2012-4581date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003818date:2012-08-24T00:00:00
db:PACKETSTORMid:110786date:2012-03-14T05:16:49
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-400date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4581date:2012-08-22T10:42:04.757