ID

VAR-201208-0524


CVE

CVE-2012-0308


TITLE

Symantec Messaging Gateway Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2012-003968

DESCRIPTION

Cross-site request forgery (CSRF) vulnerability in Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to hijack the authentication of administrators. Symantec Messaging Gateway (formerly known as Brightmail Gateway Small Business Edition) is an easy-to-use email virus protection hardware that provides accurate and effective anti-spam protection. Allows an attacker to build a malicious URI, entice an administrator to resolve, and perform malicious actions in the target user context. Other attacks are also possible. Symantec Messaging Gateway is a spam filter that integrates anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies from Symantec. ---------------------------------------------------------------------- The new Secunia CSI 6.0 is now available in beta! Seamless integration with your existing security solutions Sign-up to become a Beta tester: http://secunia.com/csi6beta ---------------------------------------------------------------------- TITLE: Symantec Messaging Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50435 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50435/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 RELEASE DATE: 2012-08-28 DISCUSS ADVISORY: http://secunia.com/advisories/50435/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50435/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Symantec Messaging Gateway, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose certain sensitive information and conduct cross-site scripting and request forgery attacks. 1) Certain input passed via web or email content is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session. 2) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. gain administrative access when a logged-in administrative user visits a specially crafted web page. 3) An error within the management interface can be exploited to perform otherwise restricted actions and e.g. modify the underlying web application. 4) The weakness is caused due to the application disclosing detailed component version information. The vulnerabilities are reported in versions 9.5.x and prior. SOLUTION: Upgrade to version 10. PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure. ORIGINAL ADVISORY: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2012-0308 // JVNDB: JVNDB-2012-003968 // CNVD: CNVD-2012-4493 // BID: 55137 // VULHUB: VHN-53589 // PACKETSTORM: 115966

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-4493

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.2

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:lteversion:9.5.4

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:ltversion:10.0

Trust: 0.8

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.4

Trust: 0.6

sources: CNVD: CNVD-2012-4493 // BID: 55137 // JVNDB: JVNDB-2012-003968 // CNNVD: CNNVD-201208-557 // NVD: CVE-2012-0308

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0308
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0308
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-557
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53589
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0308
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53589
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53589 // JVNDB: JVNDB-2012-003968 // CNNVD: CNNVD-201208-557 // NVD: CVE-2012-0308

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-53589 // JVNDB: JVNDB-2012-003968 // NVD: CVE-2012-0308

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201208-557

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201208-557

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003968

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-53589

PATCH

title:SYM12-013url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.8

title:SYM12-013url:http://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20120827_00

Trust: 0.8

title:Patch for Symantec Messaging Gateway Cross-Site Request Forgery Vulnerability (CNVD-2012-4493)url:https://www.cnvd.org.cn/patchInfo/show/20814

Trust: 0.6

sources: CNVD: CNVD-2012-4493 // JVNDB: JVNDB-2012-003968

EXTERNAL IDS

db:NVDid:CVE-2012-0308

Trust: 3.4

db:BIDid:55137

Trust: 2.0

db:JVNDBid:JVNDB-2012-003968

Trust: 0.8

db:CNNVDid:CNNVD-201208-557

Trust: 0.7

db:SECUNIAid:50435

Trust: 0.7

db:CNVDid:CNVD-2012-4493

Trust: 0.6

db:NSFOCUSid:20474

Trust: 0.6

db:EXPLOIT-DBid:23109

Trust: 0.1

db:SEEBUGid:SSVID-76887

Trust: 0.1

db:VULHUBid:VHN-53589

Trust: 0.1

db:PACKETSTORMid:115966

Trust: 0.1

sources: CNVD: CNVD-2012-4493 // VULHUB: VHN-53589 // BID: 55137 // JVNDB: JVNDB-2012-003968 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-557 // NVD: CVE-2012-0308

REFERENCES

url:http://www.securityfocus.com/bid/55137

Trust: 1.7

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0308

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0308

Trust: 0.8

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisoryhttp

Trust: 0.6

url:http://secunia.com/advisories/50435

Trust: 0.6

url:http://www.nsfocus.net/vulndb/20474

Trust: 0.6

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50435

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/50435/#comments

Trust: 0.1

url:http://secunia.com/csi6beta

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/50435/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-4493 // VULHUB: VHN-53589 // JVNDB: JVNDB-2012-003968 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-557 // NVD: CVE-2012-0308

CREDITS

Ben Williams

Trust: 0.9

sources: BID: 55137 // CNNVD: CNNVD-201208-557

SOURCES

db:CNVDid:CNVD-2012-4493
db:VULHUBid:VHN-53589
db:BIDid:55137
db:JVNDBid:JVNDB-2012-003968
db:PACKETSTORMid:115966
db:CNNVDid:CNNVD-201208-557
db:NVDid:CVE-2012-0308

LAST UPDATE DATE

2024-11-23T22:23:22.727000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4493date:2012-08-29T00:00:00
db:VULHUBid:VHN-53589date:2013-10-03T00:00:00
db:BIDid:55137date:2012-12-03T07:40:00
db:JVNDBid:JVNDB-2012-003968date:2012-08-30T00:00:00
db:CNNVDid:CNNVD-201208-557date:2012-08-29T00:00:00
db:NVDid:CVE-2012-0308date:2024-11-21T01:34:46.260

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-4493date:2012-08-29T00:00:00
db:VULHUBid:VHN-53589date:2012-08-29T00:00:00
db:BIDid:55137date:2012-08-27T00:00:00
db:JVNDBid:JVNDB-2012-003968date:2012-08-30T00:00:00
db:PACKETSTORMid:115966date:2012-08-28T06:01:36
db:CNNVDid:CNNVD-201208-557date:2012-08-29T00:00:00
db:NVDid:CVE-2012-0308date:2012-08-29T10:56:39.270