ID

VAR-201802-0923


CVE

CVE-2018-6290


TITLE

Kaspersky Secure Mail Gateway Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2018-001819

DESCRIPTION

Local Privilege Escalation in Kaspersky Secure Mail Gateway version 1.1. Kaspersky Secure Mail Gateway Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This product is mainly used for spam, phishing and malicious attachment protection, etc. An attacker can exploit this vulnerability to elevate privileges to root

Trust: 1.71

sources: NVD: CVE-2018-6290 // JVNDB: JVNDB-2018-001819 // VULHUB: VHN-136322

AFFECTED PRODUCTS

vendor:kasperskymodel:secure mail gatewayscope:eqversion:1.1

Trust: 2.4

sources: JVNDB: JVNDB-2018-001819 // CNNVD: CNNVD-201802-174 // NVD: CVE-2018-6290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-6290
value: HIGH

Trust: 1.0

NVD: CVE-2018-6290
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201802-174
value: HIGH

Trust: 0.6

VULHUB: VHN-136322
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-6290
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-136322
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-6290
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-136322 // JVNDB: JVNDB-2018-001819 // CNNVD: CNNVD-201802-174 // NVD: CVE-2018-6290

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-136322 // JVNDB: JVNDB-2018-001819 // NVD: CVE-2018-6290

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201802-174

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201802-174

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-001819

PATCH

title:Advisory issued on 1st February, 2018url:https://support.kaspersky.com/vulnerability.aspx?el=12430#010218

Trust: 0.8

title:Kaspersky Secure Mail Gateway Fixes for permission permissions and access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78305

Trust: 0.6

sources: JVNDB: JVNDB-2018-001819 // CNNVD: CNNVD-201802-174

EXTERNAL IDS

db:NVDid:CVE-2018-6290

Trust: 2.5

db:JVNDBid:JVNDB-2018-001819

Trust: 0.8

db:CNNVDid:CNNVD-201802-174

Trust: 0.7

db:VULHUBid:VHN-136322

Trust: 0.1

sources: VULHUB: VHN-136322 // JVNDB: JVNDB-2018-001819 // CNNVD: CNNVD-201802-174 // NVD: CVE-2018-6290

REFERENCES

url:https://support.kaspersky.com/vulnerability.aspx?el=12430#010218

Trust: 1.7

url:https://www.coresecurity.com/advisories/kaspersky-secure-mail-gateway-multiple-vulnerabilities

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6290

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-6290

Trust: 0.8

sources: VULHUB: VHN-136322 // JVNDB: JVNDB-2018-001819 // CNNVD: CNNVD-201802-174 // NVD: CVE-2018-6290

SOURCES

db:VULHUBid:VHN-136322
db:JVNDBid:JVNDB-2018-001819
db:CNNVDid:CNNVD-201802-174
db:NVDid:CVE-2018-6290

LAST UPDATE DATE

2024-11-23T22:26:27.931000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-136322date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-001819date:2018-03-09T00:00:00
db:CNNVDid:CNNVD-201802-174date:2020-07-22T00:00:00
db:NVDid:CVE-2018-6290date:2024-11-21T04:10:25.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-136322date:2018-02-06T00:00:00
db:JVNDBid:JVNDB-2018-001819date:2018-03-09T00:00:00
db:CNNVDid:CNNVD-201802-174date:2018-02-07T00:00:00
db:NVDid:CVE-2018-6290date:2018-02-06T15:29:00.483