ID

VAR-201208-0458


CVE

CVE-2012-4586


TITLE

McAfee Email and Web Security and McAfee Email Gateway Vulnerabilities in which access rights can be bypassed

Trust: 0.8

sources: JVNDB: JVNDB-2012-003823

DESCRIPTION

McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, accesses files with the privileges of the root user, which allows remote authenticated users to bypass intended permission settings by requesting a file. McAfee Email and Web Security Appliance and Email Gateway are prone to a cross-site scripting vulnerability, multiple information-disclosure vulnerabilities, a directory-traversal vulnerability, a security-bypass vulnerability, and an insecure-encryption vulnerability. A remote attacker could leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Exploiting the information-disclosure issues allow the attacker to view local files within the context of the Web server process. Exploiting the security-bypass vulnerability allows attackers to bypass security restrictions and obtain sensitive information or perform unauthorized actions. Exploiting the directory-traversal issue allows attackers to use directory-traversal strings to retrieve arbitrary files in the context of the affected application. Exploiting the insecure-encryption issue allows attackers to determine encryption keys, which may lead to further attacks. McAfee Email Gateway (MEG) is a suite of email security solutions from McAfee. The solution offers incoming threat protection, outgoing encryption, data loss prevention, and more. The vulnerability is caused by accessing files with root user privileges. Remote authentication users can exploit this vulnerability to bypass destination permission settings by requesting files. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: McAfee Email and Web Security Appliance and Email Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48406 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48406/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 RELEASE DATE: 2012-03-14 DISCUSS ADVISORY: http://secunia.com/advisories/48406/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48406/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48406 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in McAfee Email and Web Security Appliance and McAfee Email Gateway, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions and by malicious people to conduct cross-site scripting and brute force attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) An error in the reset password functionality can be exploited to reset the password of administrative users. 3) An error within the Dashboard discloses active session tokens and can be exploited to hijack another user's session. 4) The system backup stores passwords with weak encryption and can be exploited to decrypt the passwords via brute force attacks. 5) Certain unspecified input is not properly verified before being used to download files. This can be exploited to download arbitrary files from local resources via directory traversal sequences. 6) An unspecified error can be exploited to disclose the contents of files. Note: A weakness due to the server-side session remaining active has also been reported. SOLUTION: Update to a fixed version: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure ORIGINAL ADVISORY: https://kc.mcafee.com/corporate/index?page=content&id=SB10020 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-4586 // JVNDB: JVNDB-2012-003823 // BID: 52487 // VULHUB: VHN-57867 // PACKETSTORM: 110786

AFFECTED PRODUCTS

vendor:mcafeemodel:email gatewayscope:eqversion:7.0

Trust: 1.9

vendor:mcafeemodel:email and web securityscope:eqversion:5.0

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.5

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:eqversion:5.6

Trust: 1.6

vendor:mcafeemodel:email and web securityscope:ltversion:5.x

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:ltversion:5.6

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:5.5 patch 6

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:patch 1

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:ltversion:7.0

Trust: 0.8

vendor:mcafeemodel:email and web securityscope:eqversion:patch 3

Trust: 0.8

vendor:mcafeemodel:email gatewayscope:eqversion:6.7.1

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:eqversion:5.14

Trust: 0.3

vendor:mcafeemodel:email and web security appliancescope:eqversion:5.1

Trust: 0.3

vendor:mcafeemodel:email gateway patchscope:neversion:7.01

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.63

Trust: 0.3

vendor:mcafeemodel:email and web security appliance patchscope:neversion:5.56

Trust: 0.3

sources: BID: 52487 // JVNDB: JVNDB-2012-003823 // CNNVD: CNNVD-201208-405 // NVD: CVE-2012-4586

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-4586
value: LOW

Trust: 1.0

NVD: CVE-2012-4586
value: LOW

Trust: 0.8

CNNVD: CNNVD-201208-405
value: LOW

Trust: 0.6

VULHUB: VHN-57867
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-4586
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-57867
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-57867 // JVNDB: JVNDB-2012-003823 // CNNVD: CNNVD-201208-405 // NVD: CVE-2012-4586

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-57867 // JVNDB: JVNDB-2012-003823 // NVD: CVE-2012-4586

THREAT TYPE

remote

Trust: 1.2

sources: CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-405

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201208-405

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003823

PATCH

title:SB10020url:https://kc.mcafee.com/corporate/index?page=content&id=SB10020

Trust: 0.8

sources: JVNDB: JVNDB-2012-003823

EXTERNAL IDS

db:NVDid:CVE-2012-4586

Trust: 2.5

db:MCAFEEid:SB10020

Trust: 2.1

db:BIDid:52487

Trust: 0.9

db:JVNDBid:JVNDB-2012-003823

Trust: 0.8

db:CNNVDid:CNNVD-201208-405

Trust: 0.7

db:CNNVDid:CNNVD-201203-306

Trust: 0.6

db:SECUNIAid:48406

Trust: 0.2

db:VULHUBid:VHN-57867

Trust: 0.1

db:PACKETSTORMid:110786

Trust: 0.1

sources: VULHUB: VHN-57867 // BID: 52487 // JVNDB: JVNDB-2012-003823 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-405 // NVD: CVE-2012-4586

REFERENCES

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-4586

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-4586

Trust: 0.8

url:http://www.securityfocus.com/bid/52487

Trust: 0.6

url:http://www.mcafee.com/uk/products/email-and-web-security-appliance.aspx

Trust: 0.3

url:http://www.mcafee.com/us/products/email-gateway.aspx

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10020

Trust: 0.1

url:http://secunia.com/advisories/48406/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48406/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48406

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-57867 // BID: 52487 // JVNDB: JVNDB-2012-003823 // PACKETSTORM: 110786 // CNNVD: CNNVD-201203-306 // CNNVD: CNNVD-201208-405 // NVD: CVE-2012-4586

CREDITS

Ben Williams of NGS Secure

Trust: 0.9

sources: BID: 52487 // CNNVD: CNNVD-201203-306

SOURCES

db:VULHUBid:VHN-57867
db:BIDid:52487
db:JVNDBid:JVNDB-2012-003823
db:PACKETSTORMid:110786
db:CNNVDid:CNNVD-201203-306
db:CNNVDid:CNNVD-201208-405
db:NVDid:CVE-2012-4586

LAST UPDATE DATE

2025-04-11T22:49:26.442000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-57867date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003823date:2012-08-24T00:00:00
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-405date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4586date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-57867date:2012-08-22T00:00:00
db:BIDid:52487date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-003823date:2012-08-24T00:00:00
db:PACKETSTORMid:110786date:2012-03-14T05:16:49
db:CNNVDid:CNNVD-201203-306date:2012-03-16T00:00:00
db:CNNVDid:CNNVD-201208-405date:2012-08-23T00:00:00
db:NVDid:CVE-2012-4586date:2012-08-22T10:42:04.930