lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 04 Sep 2007 13:42:48 +0200 From: "S. Vandersee" <discuss@...solutions.de> To: full-disclosure@...ts.grok.org.uk Subject: Marshal MailMarshal TAR Unpacking Vulnerability Marshal MailMarshal TAR Unpacking Vulnerability Overview -------- Vendor: Marshal (www.marshal.com) Product: MailMarshal <= 6.2.1.3253 Vulnerability: Remote file overwrite, Remote execution Risk: HIGH Description ----------- During a security audit for a customer we have discovered a serios vulnerability in MailMarshal (an E-Mail Security Gateway) when unpacking TAR archives. MailMarshal uses an old version of GNU tar (1.11.8 + 1.5win32). Sending a special crafted TAR file it is possible to traverse through directories and even drives. Thus files can be spread onto the system and existing files can be overwritten depending on the privileges of running MailMarshal processes (default: System privileges) This can lead to a complete system compromise. Solution -------- Install vendor patch. The vendor has released a patch at: http://marshal.com/kb/article.aspx?id=11780 History ------- * 2007-08-24 Bug discovered * 2007-08-27 Vendor informed * 2007-08-30 Vendor released advisory and patches * 2007-09-04 rt-solutions.de released security advisory Credits ------- Sebastian Vandersee, rt-solutions.de GmbH rt-solutions.de GmbH Cologne, Germany http://www.rt-solutions.de _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists