Vulnerability CVE-2004-2572


Published: 2004-12-31   Modified: 2012-02-12

Description:
AMAX Magic Winmail Server 3.6 allows remote attackers to obtain sensitive information by entering (1) invalid characters such as "()" or (2) a large number of characters in the Lookup field on the netaddressbook.php web form, which reveals the path in an ldaplib.php error message when the ldap_search function fails, due to improper processing of the $keyword variable.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Amax information technologies -> Magic winmail server 

 References:
http://xforce.iss.net/xforce/xfdb/15361
http://www.securityfocus.com/bid/9786
http://www.osvdb.org/4118
http://www.magicwinmail.net/download/english-help.chm
http://secunia.com/advisories/11015
http://members.lycos.co.uk/r34ct/main/ldaplib/ldaplib.php%20reveal%20local%20path%20of%20Winmail%203.6%20webmail%20directory.txt

Copyright 2024, cxsecurity.com

 

Back to Top