Mail-Gear, a multi-purpose filtering email server, includes a webserver for remote administration and email retrieval. This webserver is vulnerable to the '../' directory traversal attack. By including the string '../' in the URL, remote attackers can gain read access to all files on the filesystem that the server has read access to.
will display the server's autoexec.bat in a default NT installation.
Symantec Mail-Gear contains a flaw that allows a remote attacker to view arbitrary files outside of the web path. The issue is due to the "Display" not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "what" variable.
Upgrade to version 1.1 or higher, as it has been reported to fix this
vulnerability. An upgrade is required as there are no known workarounds.