Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

McAfee Email Gateway - Application Protections Bypass

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

4.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:P/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

MEG is vulnerable to file attachments containing the null character. The scanning mechanism fails to identify the file name properly.

Insight

Insight

The fix changes the file name processing functionality to remove NULL characters from the raw header value before it is decoded. This addresses the vulnerability, however, there is still an exploit situation because certain mail clients, such as Microsoft Outlook, use a '.' in place of the NULL. Hence, a file name of 'test<NUL>vbs' that will now be treated as 'testvbs' may be treated as 'test.vbs' by the mail client. In such situations you would need to change your File Filter rule from '*.vbs' to just '*vbs' to protect against the exploit.

Affected Software

Affected Software

Email Gateway 7.6

Detection Method

Detection Method

Check the installed version and hotfixes

Solution

Solution

Apply the hotfix referenced in the advisory

Common Vulnerabilities and Exposures (CVE)