Vulnerabilities > CVE-2008-0860 - Unspecified vulnerability in Kerio AVG Plugin and Kerio Mailserver

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
kerio
nessus

Summary

Unspecified vulnerability in the AVG plugin in Kerio MailServer before 6.5.0 has unspecified impact via unknown remote attack vectors related to null DACLs.

Vulnerable Configurations

Part Description Count
Application
Kerio
2

Nessus

NASL familyGain a shell remotely
NASL idKERIO_KMS_650.NASL
descriptionThe remote host is running Kerio MailServer, a commercial mail server available for Windows, Linux, and Mac OS X platforms. According to its banner, the installed version of Kerio MailServer is affected by several issues : - There is a possible buffer overflow in the Visnetic antivirus plug-in. - There is an as-yet unspecified security issue with NULL DACL in the AVG plug-in. - Memory corruption is possible during uudecode decoding.
last seen2020-06-01
modified2020-06-02
plugin id31119
published2008-02-20
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/31119
titleKerio MailServer < 6.5.0 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(31119);
  script_version("1.18");
  script_cvs_date("Date: 2018/07/12 19:01:15");

  script_cve_id("CVE-2008-0858", "CVE-2008-0859", "CVE-2008-0860");
  script_bugtraq_id(27868);
  script_xref(name:"Secunia", value:"29021");

  script_name(english:"Kerio MailServer < 6.5.0 Multiple Vulnerabilities");
  script_summary(english:"Checks version of KMS services");

 script_set_attribute(attribute:"synopsis", value:
"The remote mail server is affected by multiple vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Kerio MailServer, a commercial mail server
available for Windows, Linux, and Mac OS X platforms. 

According to its banner, the installed version of Kerio MailServer is
affected by several issues :

  - There is a possible buffer overflow in the Visnetic
    antivirus plug-in.

  - There is an as-yet unspecified security issue with NULL
    DACL in the AVG plug-in.

  - Memory corruption is possible during uudecode decoding." );
 script_set_attribute(attribute:"see_also", value:"http://www.kerio.com/kms_history.html" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Kerio MailServer 6.5.0 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(94, 399);
 script_set_attribute(attribute:"plugin_publication_date", value: "2008/02/20");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:kerio:kerio_mailserver");
script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Gain a shell remotely");

  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("kerio_kms_641.nasl");
  script_require_keys("kerio/port");

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");

port = get_kb_item('kerio/port');
if (isnull(port)) exit(1, "The 'kerio/port' KB item is missing.");

service = get_kb_item('kerio/'+port+'/service');
ver = get_kb_item('kerio/'+port+'/version');
display_ver = get_kb_item('kerio/'+port+'/display_version');

# There's a problem if the version is < 6.5.0.
iver = split(ver, sep:'.', keep:FALSE);
for (i=0; i<max_index(iver); i++)
  iver[i] = int(iver[i]);

fix = split("6.5.0", sep:'.', keep:FALSE);
for (i=0; i<max_index(fix); i++)
  fix[i] = int(fix[i]);

for (i=0; i<max_index(iver); i++)
  if ((iver[i] < fix[i]))
  {
    if (report_verbosity)
    {
      report = string(
        "\n",
        "According to its ", service, " banner, the remote host is running Kerio\n",
        "MailServer version ", display_ver, ".\n"
      );
      security_hole(port:port, extra:report);
    }
    else security_hole(port);

    exit(0);
    # never reached
  }
  else if (iver[i] > fix[i])
    break;

exit(0, 'Kerio MailServer '+display_ver+' is not affected.');