ID

VAR-201208-0456


CVE

CVE-2012-4584


TITLE

McAfee Email and Web Security and McAfee Email Gateway Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-003821

DESCRIPTION

McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not properly encrypt system-backup data, which makes it easier for remote authenticated users to obtain sensitive information by reading a backup file, as demonstrated by obtaining password hashes. McAfee Email and Web Security Appliance and Email Gateway are prone to a cross-site scripting vulnerability, multiple information-disclosure vulnerabilities, a directory-traversal vulnerability, a security-bypass vulnerability, and an insecure-encryption vulnerability. A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process. Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions. Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application. Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. McAfee Email Gateway (MEG) is a suite of email security solutions from McAfee. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. The vulnerability stems from incorrect encryption of system backup data . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: McAfee Email and Web Security Appliance and Email Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48406 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48406/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48406/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48406/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) An error in the reset password functionality can be exploited to reset the password of administrative users. 3) An error within the Dashboard discloses active session tokens and can be exploited to hijack another user's session. 4) The system backup stores passwords with weak encryption and can be exploited to decrypt the passwords via brute force attacks. 5) Certain unspecified input is not properly verified before being used to download files. This can be exploited to download arbitrary files from local resources via directory traversal sequences. 6) An unspecified error can be exploited to disclose the contents of files. Note: A weakness due to the server-side session remaining active has also been reported. SOLUTION: Update to a fixed version: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure ORIGINAL ADVISORY: https://kc.mcafee.com/corporate/index?page=content&id=SB10020 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-4584 // JVNDB: JVNDB-2012-003821 // BID: 52487 // VULHUB: VHN-57865 // PACKETSTORM: 110786

AFFECTED PRODUCTS

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 1.9

vendor:mcafeemodel:email and web securityscope:eqversion:5.0

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.5

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.6

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:ltversion:5.x

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:ltversion:5.6

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:5.5 patch 6

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:patch 1

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:ltversion:7.0

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:patch 3

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:6.7.1

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:eqversion:5.14

Trust: 0.3

vendor:mcafeemodel:email and web security appliancescope:eqversion:5.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:neversion:7.01

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.63

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.56

Trust: 0.3

sources: BID: 52487 // JVNDB: JVNDB-2012-003821 // CNNVD: CNNVD-201208-403 // NVD: CVE-2012-4584

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4584
value: LOW

Trust: 1.0

NVD: CVE-2012-4584
value: LOW

Trust: 0.8

CNNVD: CNNVD-201208-403
value: LOW

Trust: 0.6

VULHUB: VHN-57865
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-4584
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57865
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57865 // JVNDB: JVNDB-2012-003821 // CNNVD: CNNVD-201208-403 // NVD: CVE-2012-4584

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-57865 // JVNDB: JVNDB-2012-003821 // NVD: CVE-2012-4584

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-403

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201208-403

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003821

PATCH

title:SB10020url:https://kc.mcafee.com/corporate/index?page=content&id=SB10020

Trust: 0.8

sources: JVNDB: JVNDB-2012-003821

EXTERNAL IDS

db:NVDid:CVE-2012-4584

Trust: 2.5

db:MCAFEEid:SB10020

Trust: 2.1

db:BIDid:52487

Trust: 0.9

db:JVNDBid:JVNDB-2012-003821

Trust: 0.8

db:CNNVDid:CNNVD-201208-403

Trust: 0.7

db:CNNVDid:CNNVD-201203-306

Trust: 0.6

db:SECUNIAid:48406

Trust: 0.2

db:VULHUBid:VHN-57865

Trust: 0.1

db:PACKETSTORMid:110786

Trust: 0.1

sources: VULHUB: VHN-57865 // BID: 52487 // JVNDB: JVNDB-2012-003821 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-403 // NVD: CVE-2012-4584

REFERENCES

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 2.0

url:http://archives.neohapsis.com/archives/bugtraq/2012-03/0162.html

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4584

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4584

Trust: 0.8

url:http://www.securityfocus.com/bid/52487

Trust: 0.6

url:http://www.mcafee.com/uk/products/email-and-web-security-appliance.aspx

Trust: 0.3

url:http://www.mcafee.com/us/products/email-gateway.aspx

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 0.1

url:http://secunia.com/advisories/48406/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48406/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48406

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57865 // BID: 52487 // JVNDB: JVNDB-2012-003821 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-403 // NVD: CVE-2012-4584

CREDITS

Ben Williams of NGS Secure

Trust: 0.9

sources: BID: 52487 // CNNVD: CNNVD-201203-306

SOURCES

db:VULHUBid:VHN-57865
db:BIDid:52487
db:JVNDBid:JVNDB-2012-003821
db:PACKETSTORMid:110786
db:CNNVDid:CNNVD-201203-306
db:CNNVDid:CNNVD-201208-403
db:NVDid:CVE-2012-4584

LAST UPDATE DATE

2025-04-11T22:49:26.248000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57865date:2012-10-30T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003821date:2012-08-24T00:00:00
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-403date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4584date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-57865date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003821date:2012-08-24T00:00:00
db:PACKETSTORMid:110786date:2012-03-14T05:16:49
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-403date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4584date:2012-08-22T10:42:04.867