The remote host is running MailMarshal Mail Server version 6.2.1 or lower. There is a flaw in the remote version of this server. An attacker can create an archive file such that upon opening, critical system files would be overwritten with files of the attacker's choice. Successful exploitation would result in the attacker replacing arbitrary files.
{"id": "4203.PRM", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "MailMarshal <= 6.2.1 tar Archive Traversal Arbitrary File Overwrite (deprecated)", "description": "The remote host is running MailMarshal Mail Server version 6.2.1 or lower. There is a flaw in the remote version of this server. An attacker can create an archive file such that upon opening, critical system files would be overwritten with files of the attacker's choice. Successful exploitation would result in the attacker replacing arbitrary files. ", "published": "2007-09-04T00:00:00", "modified": "2018-09-16T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nnm/4203", "reporter": "Tenable", "references": ["http://marshal.com/kb/article.aspx?id=11780"], "cvelist": [], "immutableFields": [], "lastseen": "2023-05-18T15:00:17", "viewCount": 10, "enchantments": {"dependencies": {}, "score": {"value": 2.7, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 2.7}, "_state": {"dependencies": 1684449048, "score": 1684423459, "epss": 0}, "_internal": {"score_hash": "f791ad0b053349477cbd468e8c4c1831"}, "pluginID": "4203", "sourceData": "Binary data 4203.prm", "naslFamily": "SMTP Servers", "cpe": [], "solution": "Upgrade to a version higher than 6.2.1.", "nessusSeverity": "High", "cvssScoreSource": "", "vendor_cvss2": {"score": 4.3, "vector": "CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:P"}, "vendor_cvss3": {"score": null, "vector": null}, "vpr": {}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": null, "vulnerabilityPublicationDate": null, "exploitableWith": []}