Lucene search

K
openvasCopyright (C) 2008 Tenable Network Security & David MaciejakOPENVAS:136141256231080069
HistoryOct 24, 2008 - 12:00 a.m.

Kerio WebMail < 5.7.7 Multiple Vulnerabilities

2008-10-2400:00:00
Copyright (C) 2008 Tenable Network Security & David Maciejak
plugins.openvas.org
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

AI Score

Confidence

Low

0.025 Low

EPSS

Percentile

90.2%

Kerio MailServer is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2008 Tenable Network Security & David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:kerio:kerio_mailserver";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.80069");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2008-10-24 23:33:44 +0200 (Fri, 24 Oct 2008)");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_cve_id("CVE-2002-1434", "CVE-2003-0487", "CVE-2003-0488");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/5507");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7966");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7967");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/7968");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/8230");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/9975");
  script_xref(name:"OSVDB", value:"2159");
  script_xref(name:"OSVDB", value:"4953");
  script_xref(name:"OSVDB", value:"4954");
  script_xref(name:"OSVDB", value:"4955");
  script_xref(name:"OSVDB", value:"4956");
  script_xref(name:"OSVDB", value:"4958");
  script_name("Kerio WebMail < 5.7.7 Multiple Vulnerabilities");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 Tenable Network Security & David Maciejak");
  script_family("Gain a shell remotely");
  script_dependencies("gb_kerio_mailserver_detect.nasl");
  script_mandatory_keys("KerioMailServer/detected");

  script_tag(name:"solution", value:"Update to version 5.7.7 or later.");

  script_tag(name:"summary", value:"Kerio MailServer is prone to multiple vulnerabilities.");

  script_tag(name:"insight", value:"There are multiple flaws in this interface which may allow an
  attacker with a valid webmail account on this host to obtain a shell on this host or to perform a
  cross-site-scripting attack against this host with version prior to 5.6.4. Version of MailServer
  prior to 5.6.5 are also prone to a denial of service condition when an incorrect login to the
  admin console occurs. This could cause the server to crash. Version of MailServer prior to 5.7.7
  is prone to a remotely exploitable buffer overrun condition. This vulnerability exists in the spam
  filter component. If successfully exploited, this could permit remote attackers to execute
  arbitrary code in the context of the MailServer software. This could also cause a denial of
  service in the server.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_banner");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! vers = get_app_version( cpe:CPE, nofork:TRUE, version_regex:"^5\." ) ) exit( 0 );

if( version_is_less( version:vers, test_version:"5.7.7" ) ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:"5.7.7" );
  security_message( port:0, data:report );
  exit( 0 );
}

exit( 99 );

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

AI Score

Confidence

Low

0.025 Low

EPSS

Percentile

90.2%

Related for OPENVAS:136141256231080069