CVE-2006-3215
CVSS7.5
发布时间 :2006-06-23 21:06:00
修订时间 :2011-03-07 21:38:06
NMCO    

[原文]Clearswift MAILsweeper for SMTP before 4.3.20 and MAILsweeper for Exchange before 4.3.20 allows remote attackers to bypass the "text analysis", possibly bypassing SPAM and other filters, by sending an e-mail specifying a non-existent or unrecognized character set.


[CNNVD]SMTP Clearswift MAILsweeper/Exchange MAILsweeper e-mail 访问控制绕过漏洞(CNNVD-200606-467)

        SMTP 4.3.20之前版本的Clearswift MAILsweeper 和 Exchange 4.3.20之前版本的MAILsweeper可以使远程攻击者通过发送指定不存在或无法识别的字符集的e-mail,来绕过"文本分析",有可能绕过SPAM 及其他过滤器。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:clearswift:mailsweeper_for_exchange:4.3.19
cpe:/a:clearswift:mailsweeper_for_smtp:4.3.19

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3215
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3215
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-467
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18584
(PATCH)  BID  18584
http://secunia.com/advisories/20756
(VENDOR_ADVISORY)  SECUNIA  20756
http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4,3,20.htm
(PATCH)  CONFIRM  http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4,3,20.htm
http://www.vupen.com/english/advisories/2006/2473
(UNKNOWN)  VUPEN  ADV-2006-2473
http://xforce.iss.net/xforce/xfdb/27301
(UNKNOWN)  XF  mailsweeper-charcter-set-security-bypass(27301)
http://www.osvdb.org/26737
(UNKNOWN)  OSVDB  26737

- 漏洞信息

SMTP Clearswift MAILsweeper/Exchange MAILsweeper e-mail 访问控制绕过漏洞
高危 设计错误
2006-06-23 00:00:00 2006-06-29 00:00:00
远程  
        SMTP 4.3.20之前版本的Clearswift MAILsweeper 和 Exchange 4.3.20之前版本的MAILsweeper可以使远程攻击者通过发送指定不存在或无法识别的字符集的e-mail,来绕过"文本分析",有可能绕过SPAM 及其他过滤器。

- 公告与补丁

        暂无数据

- 漏洞信息

26737
MAILsweeper for SMTP/Exchange Invalid Character Set Scan Bypass
Remote / Network Access Attack Type Unknown
Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

MAILsweeper for SMTP/Exchange contains a flaw that may allow a malicious user to bypass text analysis. The issue is triggered when handling of messages that specify a non-existent character set. It is possible that the flaw may allow filter bypassing resulting in a loss of integrity.

- 时间线

2006-06-21 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 4.3.20 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站