Lucene search

K
openvasCopyright (C) 2008 Greenbone AGOPENVAS:1361412562310800206
HistoryDec 16, 2008 - 12:00 a.m.

MailScanner Multiple Insecure Temporary Files Vulnerabilities

2008-12-1600:00:00
Copyright (C) 2008 Greenbone AG
plugins.openvas.org
10

4.8 Medium

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

MailScanner is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2008 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.800206");
  script_version("2023-07-28T05:05:23+0000");
  script_tag(name:"last_modification", value:"2023-07-28 05:05:23 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-12-16 16:12:00 +0100 (Tue, 16 Dec 2008)");
  script_tag(name:"cvss_base", value:"6.9");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:M/Au:N/C:C/I:C/A:C");
  script_cve_id("CVE-2008-5312", "CVE-2008-5313");
  script_name("MailScanner Multiple Insecure Temporary Files Vulnerabilities");
  script_xref(name:"URL", value:"http://secunia.com/advisories/33117/");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/32557");
  script_xref(name:"URL", value:"http://www.mailscanner.info/ChangeLog");
  script_xref(name:"URL", value:"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506353");
  script_xref(name:"URL", value:"http://www.openwall.com/lists/oss-security/2008/11/29/1");

  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"executable_version");
  script_copyright("Copyright (C) 2008 Greenbone AG");
  script_family("General");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("login/SSH/success");
  script_exclude_keys("ssh/no_linux_shell");

  script_tag(name:"impact", value:"Successful exploitation will let the attacker execute arbitrary codes
  in the context of the application and can compromise a vulnerable system.");
  script_tag(name:"affected", value:"MailScanner version prior to 4.74.7-2 on Linux.");
  script_tag(name:"insight", value:"The flaws are due to:

  - Several autoupdate scripts for f-prot-autoupdate, clamav-autoupdate,
  panda-autoupdate, trend-autoupdate, bitdefender-wrapper, kaspersky-wrapper
  etc. use temporary files in an insecure manner.

  - The SpamAssassin and TNEF handlers use temporary files in an insecure manner.
  These can be exploited to affects local users to overwrite arbitrary files via
  symlink attacks.");
  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"solution", value:"Upgrade to the latest MailScanner version 4.74.7-2 or later.");
  script_tag(name:"summary", value:"MailScanner is prone to multiple vulnerabilities.");
  exit(0);
}

include("ssh_func.inc");
include("version_func.inc");

sock = ssh_login_or_reuse_connection();
if(sock)
{
  send_cmd = ssh_cmd(socket:sock, cmd:"MailScanner -v", timeout:120);
  ssh_close_connection();
  if("MailScanner" >< send_cmd)
  {
    scanner_ver =  eregmatch(pattern:"MailScanner version ([0-9.]+)", string:send_cmd);
    if(scanner_ver[1] != NULL)
    {
      if(version_is_less_equal(version:scanner_ver[1], test_version:"4.74.7")){
        report = report_fixed_ver(installed_version:scanner_ver[1], vulnerable_range:"Less than or equal to 4.74.7");
        security_message(port: 0, data: report);
      }
    }
  }
}

4.8 Medium

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

Related for OPENVAS:1361412562310800206