ID

VAR-201208-0454


CVE

CVE-2012-4582


TITLE

McAfee Email and Web Security and McAfee Email Gateway Vulnerable to resetting the password of any administrator account

Trust: 0.8

sources: JVNDB: JVNDB-2012-003819

DESCRIPTION

McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote authenticated users to reset the passwords of arbitrary administrative accounts via unspecified vectors. A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process. Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions. Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application. Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: McAfee Email and Web Security Appliance and Email Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48406 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48406/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48406/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48406/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) An error in the reset password functionality can be exploited to reset the password of administrative users. 3) An error within the Dashboard discloses active session tokens and can be exploited to hijack another user's session. 4) The system backup stores passwords with weak encryption and can be exploited to decrypt the passwords via brute force attacks. 5) Certain unspecified input is not properly verified before being used to download files. This can be exploited to download arbitrary files from local resources via directory traversal sequences. 6) An unspecified error can be exploited to disclose the contents of files. Note: A weakness due to the server-side session remaining active has also been reported. SOLUTION: Update to a fixed version: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure ORIGINAL ADVISORY: https://kc.mcafee.com/corporate/index?page=content&id=SB10020 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-4582 // JVNDB: JVNDB-2012-003819 // BID: 52487 // VULHUB: VHN-57863 // PACKETSTORM: 110786

AFFECTED PRODUCTS

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 1.9

vendor:mcafeemodel:email and web securityscope:eqversion:5.0

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.5

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.6

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:ltversion:5.x

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:ltversion:5.6

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:5.5 patch 6

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:patch 1

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:ltversion:7.0

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:patch 3

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:6.7.1

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:eqversion:5.14

Trust: 0.3

vendor:mcafeemodel:email and web security appliancescope:eqversion:5.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:neversion:7.01

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.63

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.56

Trust: 0.3

sources: BID: 52487 // JVNDB: JVNDB-2012-003819 // CNNVD: CNNVD-201208-401 // NVD: CVE-2012-4582

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4582
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-4582
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-401
value: MEDIUM

Trust: 0.6

VULHUB: VHN-57863
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-4582
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57863
severity: MEDIUM
baseScore: 4.9
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57863 // JVNDB: JVNDB-2012-003819 // CNNVD: CNNVD-201208-401 // NVD: CVE-2012-4582

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-57863 // JVNDB: JVNDB-2012-003819 // NVD: CVE-2012-4582

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-401

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201208-401

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003819

PATCH

title:SB10020url:https://kc.mcafee.com/corporate/index?page=content&id=SB10020

Trust: 0.8

sources: JVNDB: JVNDB-2012-003819

EXTERNAL IDS

db:NVDid:CVE-2012-4582

Trust: 2.5

db:MCAFEEid:SB10020

Trust: 2.1

db:BIDid:52487

Trust: 0.9

db:JVNDBid:JVNDB-2012-003819

Trust: 0.8

db:CNNVDid:CNNVD-201208-401

Trust: 0.7

db:CNNVDid:CNNVD-201203-306

Trust: 0.6

db:SECUNIAid:48406

Trust: 0.2

db:VULHUBid:VHN-57863

Trust: 0.1

db:PACKETSTORMid:110786

Trust: 0.1

sources: VULHUB: VHN-57863 // BID: 52487 // JVNDB: JVNDB-2012-003819 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-401 // NVD: CVE-2012-4582

REFERENCES

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 2.0

url:http://archives.neohapsis.com/archives/bugtraq/2012-03/0160.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4582

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4582

Trust: 0.8

url:http://www.securityfocus.com/bid/52487

Trust: 0.6

url:http://www.mcafee.com/uk/products/email-and-web-security-appliance.aspx

Trust: 0.3

url:http://www.mcafee.com/us/products/email-gateway.aspx

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 0.1

url:http://secunia.com/advisories/48406/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48406/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48406

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57863 // BID: 52487 // JVNDB: JVNDB-2012-003819 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-401 // NVD: CVE-2012-4582

CREDITS

Ben Williams of NGS Secure

Trust: 0.9

sources: BID: 52487 // CNNVD: CNNVD-201203-306

SOURCES

db:VULHUBid:VHN-57863
db:BIDid:52487
db:JVNDBid:JVNDB-2012-003819
db:PACKETSTORMid:110786
db:CNNVDid:CNNVD-201203-306
db:CNNVDid:CNNVD-201208-401
db:NVDid:CVE-2012-4582

LAST UPDATE DATE

2025-04-11T22:49:26.362000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57863date:2012-11-20T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003819date:2012-08-24T00:00:00
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-401date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4582date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-57863date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003819date:2012-08-24T00:00:00
db:PACKETSTORMid:110786date:2012-03-14T05:16:49
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-401date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4582date:2012-08-22T10:42:04.787