DESCRIPTION:
A weakness, a security issue, and multiple vulnerabilities have been
reported in MDaemon, which can be exploited by malicious users to
bypass certain security restrictions and by malicious people to
conduct session hijacking, cross-site request forgery, and script
insertion attacks, manipulate certain data, disclose certain
sensitive information, and cause a DoS (Denial of Service).

1) The application generates WorldClient session identifiers in a
predictable way, which can be exploited to predict session
identifiers and conduct session hijacking attacks.

2) The application discloses the validity of email addresses via the
Free-Busy schedule of WorldClient, which can be exploited to e.g.
enumerate valid email addresses or user names.

3) The application allows users to perform certain actions via HTTP
requests without performing proper validity checks to verify the
requests. This can be exploited to e.g. modify authentication
credentials or enable mail forwarding when a logged-in user visits a
specially crafted web page.

4) Input related to email body is not properly sanitised in
WorldClient before being used. This can be exploited to insert
arbitrary HTML and script code, which will be executed in a user's
browser session in context of an affected site if malicious data is
viewed.

5) The application does not properly restrict access to the user
import functionality in WebAdmin, which can be exploited to e.g.
import a specially crafted user data and subsequently execute
arbitrary code.

6) The TLS implementation does not properly clear transport layer
buffers when upgrading from plaintext to ciphertext after receiving
the "STARTTLS" command. This can be exploited to insert arbitrary
plaintext data (e.g. IMAP commands) during the plaintext phase, which
will then be executed after upgrading to the TLS ciphertext phase.

7) An error when processing email headers can be exploited to cause a
crash by sending a specially crafted email message.

Successful exploitation of this vulnerability requires the "Strip
X-Headers" setting to be enabled.

The vulnerabilities are reported in versions prior to 13.0.4.

SOLUTION:
Update to version 13.0.4.

PROVIDED AND/OR DISCOVERED BY:
1 - 5) Demetris Papapetrou, QSecure.
6, 7) Reported by the vendor.

ORIGINAL ADVISORY:
MDaemon:
http://files.altn.com/MDaemon/release/relnotes_en.html

Demetris Papapetrou:
http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_and_WebAdmin_CSRF.html
http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_Predictable_Session_ID.html
http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_Email_Body_HTML_JS_Injection.html
http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WorldClient_Username_Enumeration.html
http://www.qsecure.com.cy/advisories/Alt-N_MDaemon_WebAdmin_Remote_Code_Execution.html
http://www.qsecure.com.cy/whitepapers/Pwning_MDaemon.pdf

OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

Powered by Telkomsel BlackBerry®

Kirim email ke