Check Point Advisories

Ipswitch IMail Web Calendaring Arbitrary File Read (CVE-2005-1252)

Check Point Reference: CPAI-2005-255
Date Published: 26 Oct 2009
Severity: Medium
Last Updated: Monday 26 October, 2009
Source:
Industry Reference:CVE-2005-1252
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description The Ipswitch IMail Server product contains a variety of server components. These components include POP3, SMTP, IMAP, and a Web Calendaring server. The IMail Web Calendaring server provides functions for users to store schedules, set appointments, and send reminder information using HTTP protocol. The service is accessed through a web browser. A directory traversal vulnerability exists within the IMail Web Calendaring server. The vulnerability is a result of a flaw in the handling of HTTP requests for static resources. An unauthenticated attacker may exploit this vulnerability to remotely read arbitrary files with System privileges. The target will not exhibit any unusual behaviour as a result of this attack. A successful attack will result in potentially sensitive information being disclosed to an unprivileged user. The content of arbitrary files, specified by the attacker in the request will be served in the HTTP response.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Ipswitch IMail Web Calendaring Arbitrary File Read protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Application Servers Protection Violation.
Attack Information:  Ipswitch IMail web calendaring arbitrary file read

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK