[<prev] [next>] [day] [month] [year] [list]
Message-ID: <46DD44B8.2040208@rt-solutions.de>
Date: Tue, 04 Sep 2007 13:42:48 +0200
From: "S. Vandersee" <discuss@...solutions.de>
To: full-disclosure@...ts.grok.org.uk
Subject: Marshal MailMarshal TAR Unpacking Vulnerability
Marshal MailMarshal TAR Unpacking Vulnerability
Overview
--------
Vendor: Marshal (www.marshal.com)
Product: MailMarshal <= 6.2.1.3253
Vulnerability: Remote file overwrite, Remote execution
Risk: HIGH
Description
-----------
During a security audit for a customer we have discovered
a serios vulnerability in MailMarshal (an E-Mail Security Gateway)
when unpacking TAR archives.
MailMarshal uses an old version of GNU tar (1.11.8 + 1.5win32).
Sending a special crafted TAR file it is possible to traverse
through directories and even drives. Thus files can be spread
onto the system and existing files can be overwritten depending
on the privileges of running MailMarshal processes (default:
System privileges) This can lead to a complete system compromise.
Solution
--------
Install vendor patch. The vendor has released a patch at:
http://marshal.com/kb/article.aspx?id=11780
History
-------
* 2007-08-24 Bug discovered
* 2007-08-27 Vendor informed
* 2007-08-30 Vendor released advisory and patches
* 2007-09-04 rt-solutions.de released security advisory
Credits
-------
Sebastian Vandersee, rt-solutions.de GmbH
rt-solutions.de GmbH
Cologne, Germany
http://www.rt-solutions.de
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists