ID

VAR-201208-0498


CVE

CVE-2012-3581


TITLE

Symantec Messaging Gateway Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2012-003971

DESCRIPTION

Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to obtain potentially sensitive information about component versions via unspecified vectors. Symantec Messaging Gateway (formerly known as Brightmail Gateway Small Business Edition) is an easy-to-use email virus protection hardware that provides accurate and effective anti-spam protection. A security vulnerability exists in the Symantec Messaging Gateway application. Symantec Messaging Gateway is a spam filter that integrates anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies from Symantec. ---------------------------------------------------------------------- The new Secunia CSI 6.0 is now available in beta! Seamless integration with your existing security solutions Sign-up to become a Beta tester: http://secunia.com/csi6beta ---------------------------------------------------------------------- TITLE: Symantec Messaging Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50435 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50435/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 RELEASE DATE: 2012-08-28 DISCUSS ADVISORY: http://secunia.com/advisories/50435/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50435/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Symantec Messaging Gateway, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose certain sensitive information and conduct cross-site scripting and request forgery attacks. 1) Certain input passed via web or email content is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session. 2) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. gain administrative access when a logged-in administrative user visits a specially crafted web page. 3) An error within the management interface can be exploited to perform otherwise restricted actions and e.g. modify the underlying web application. The vulnerabilities are reported in versions 9.5.x and prior. SOLUTION: Upgrade to version 10. PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure. ORIGINAL ADVISORY: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-3581 // JVNDB: JVNDB-2012-003971 // CNVD: CNVD-2012-4495 // BID: 55142 // VULHUB: VHN-56862 // PACKETSTORM: 115966

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-4495

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.2

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:lteversion:9.5.4

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:ltversion:10.0

Trust: 0.8

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.4

Trust: 0.6

sources: CNVD: CNVD-2012-4495 // BID: 55142 // JVNDB: JVNDB-2012-003971 // CNNVD: CNNVD-201208-554 // NVD: CVE-2012-3581

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3581
value: LOW

Trust: 1.0

NVD: CVE-2012-3581
value: LOW

Trust: 0.8

CNNVD: CNNVD-201208-554
value: LOW

Trust: 0.6

VULHUB: VHN-56862
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2012-3581
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56862
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56862 // JVNDB: JVNDB-2012-003971 // CNNVD: CNNVD-201208-554 // NVD: CVE-2012-3581

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-56862 // JVNDB: JVNDB-2012-003971 // NVD: CVE-2012-3581

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201208-554

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201208-554

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003971

PATCH

title:SYM12-013url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.8

title:SYM12-013url:http://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20120827_00

Trust: 0.8

title:Patch for Symantec Messaging Gateway Information Disclosure Vulnerability (CNVD-2012-4495)url:https://www.cnvd.org.cn/patchInfo/show/20816

Trust: 0.6

sources: CNVD: CNVD-2012-4495 // JVNDB: JVNDB-2012-003971

EXTERNAL IDS

db:NVDid:CVE-2012-3581

Trust: 3.4

db:BIDid:55142

Trust: 2.0

db:JVNDBid:JVNDB-2012-003971

Trust: 0.8

db:CNNVDid:CNNVD-201208-554

Trust: 0.7

db:SECUNIAid:50435

Trust: 0.7

db:CNVDid:CNVD-2012-4495

Trust: 0.6

db:NSFOCUSid:20471

Trust: 0.6

db:VULHUBid:VHN-56862

Trust: 0.1

db:PACKETSTORMid:115966

Trust: 0.1

sources: CNVD: CNVD-2012-4495 // VULHUB: VHN-56862 // BID: 55142 // JVNDB: JVNDB-2012-003971 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-554 // NVD: CVE-2012-3581

REFERENCES

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 2.0

url:http://www.securityfocus.com/bid/55142

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3581

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3581

Trust: 0.8

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisoryhttp

Trust: 0.6

url:http://secunia.com/advisories/50435

Trust: 0.6

url:http://www.nsfocus.net/vulndb/20471

Trust: 0.6

url:http://www.symantec.com/messaging-gateway

Trust: 0.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50435

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/50435/#comments

Trust: 0.1

url:http://secunia.com/csi6beta

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/50435/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-4495 // VULHUB: VHN-56862 // BID: 55142 // JVNDB: JVNDB-2012-003971 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-554 // NVD: CVE-2012-3581

CREDITS

Ben Williams with NGS Secure

Trust: 0.9

sources: BID: 55142 // CNNVD: CNNVD-201208-554

SOURCES

db:CNVDid:CNVD-2012-4495
db:VULHUBid:VHN-56862
db:BIDid:55142
db:JVNDBid:JVNDB-2012-003971
db:PACKETSTORMid:115966
db:CNNVDid:CNNVD-201208-554
db:NVDid:CVE-2012-3581

LAST UPDATE DATE

2024-11-23T22:23:22.685000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4495date:2012-08-29T00:00:00
db:VULHUBid:VHN-56862date:2013-10-10T00:00:00
db:BIDid:55142date:2012-08-27T00:00:00
db:JVNDBid:JVNDB-2012-003971date:2012-08-30T00:00:00
db:CNNVDid:CNNVD-201208-554date:2012-08-29T00:00:00
db:NVDid:CVE-2012-3581date:2024-11-21T01:41:11.233

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-4495date:2012-08-29T00:00:00
db:VULHUBid:VHN-56862date:2012-08-29T00:00:00
db:BIDid:55142date:2012-08-27T00:00:00
db:JVNDBid:JVNDB-2012-003971date:2012-08-30T00:00:00
db:PACKETSTORMid:115966date:2012-08-28T06:01:36
db:CNNVDid:CNNVD-201208-554date:2012-08-29T00:00:00
db:NVDid:CVE-2012-3581date:2012-08-29T10:56:40.223