| VID |
22315 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The ArGoSoft Mail Server, according to its banner, has multiple directory traversal vulnerabilities. ArGoSoft Mail Server is fully functional SMTP/POP3/Finger server with a built-in HTTP server for Microsoft Windows platforms. ArGoSoft Mail Server versions prior to 1.8.7.4 could allow a remote authenticated attacker to traverse directories on the system and upload arbitrary files:
1) An input validation error in the attachment handling can be exploited to create or overwrite arbitrary files via directory traversal attacks. 2) The problem is that the "_msgatt.rec" file, which holds information about uploaded files, can be overwritten by an uploaded attachment. This can be exploited to include arbitrary files as attachments in an mail via directory traversal attacks. 3) Input passed to the "Folder" parameter in "msg", "delete", "folderdelete" and "folderadd" isn't properly sanitized before being used. This can be exploited to access or delete mails for other currently logged on users, and create or delete arbitrary directories via directory traversal attacks.
* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.
* References: http://www.security.org.sg/vuln/argosoftmail1873.html http://secunia.com/advisories/14161/ http://archives.neohapsis.com/archives/bugtraq/2005-02/0053.html
* Platforms Affected: ArGoSoft Mail Server prior to 1.8.7.4 Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of ArGoSoft Mail server (1.8.7.4 or later), available from the ArGoSoft Mail Server Download Web site at http://download.cnet.com/ArGoSoft-Mail-Server-Freeware/3000-2369_4-10038331.html |
| Related URL |
CVE-2005-1282,CVE-2005-1284 (CVE) |
| Related URL |
13323,13326 (SecurityFocus) |
| Related URL |
20225,20228 (ISS) |
|