The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of McAfee Security for Email Servers

computer vulnerability note CVE-2015-4808 CVE-2015-6013 CVE-2015-6014

Oracle Outside In Technology: multiple vulnerabilities of January 2016

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Oracle Outside In Technology.
Impacted products: GroupShield, McAfee Security for Email Servers, Exchange, Oracle OIT.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 5.
Creation date: 20/01/2016.
Identifiers: cpujan2016, CVE-2015-4808, CVE-2015-6013, CVE-2015-6014, CVE-2015-6015, CVE-2016-0432, VIGILANCE-VUL-18759, VU#916896.

Description of the vulnerability

Several vulnerabilities were announced in Oracle Outside In Technology.

An attacker can use a vulnerability of Filters, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2015-4808]

An attacker can use a vulnerability of Filters, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2015-6013]

An attacker can use a vulnerability of Filters, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2015-6014]

An attacker can use a vulnerability of Filters, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2015-6015]

An attacker can use a vulnerability of Filters, in order to obtain information, to alter information, or to trigger a denial of service. [severity:3/4; CVE-2016-0432]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 12832

McAfee Security for Microsoft Exchange: Cross Site Scripting of Configuration Console

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting in the Configuration Console of McAfee Security for Microsoft Exchange, in order to execute JavaScript code in the context of the web site.
Impacted products: McAfee Security for Email Servers.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 15/05/2013.
Identifiers: 829918, 829926, VIGILANCE-VUL-12832.

Description of the vulnerability

The McAfee Security for Microsoft Exchange product uses a web configuration console.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting in the Configuration Console of McAfee Security for Microsoft Exchange, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2013-2393

Oracle Outside In Technology: memory corruption

Synthesis of the vulnerability

An attacker can generate a memory corruption of Oracle Outside In Technology, in order to trigger a denial of service, and possibly to execute code.
Impacted products: McAfee Email and Web Security, McAfee Email Gateway, McAfee Security for Email Servers, Exchange, Oracle OIT.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Creation date: 17/04/2013.
Identifiers: 2876063, CERTA-2013-AVI-247, CERTA-2013-AVI-472, cpuapr2013, CVE-2013-2393, MS13-061, SB10052, VIGILANCE-VUL-12681.

Description of the vulnerability

An attacker can therefore generate a memory corruption of Oracle Outside In Technology, in order to trigger a denial of service, and possibly to execute code.



Note: Oracle indicates that this vulnerability leads to a denial of service. Microsoft indicates that this vulnerability leads to code execution.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 12342

McAfee Security for Microsoft Exchange: denial of service via XLSX

Synthesis of the vulnerability

An attacker can use a malicious Microsoft Excel XLSX file, in order to generate two denials of service in McAfee Security for Microsoft Exchange.
Impacted products: McAfee Security for Email Servers.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: document.
Creation date: 21/01/2013.
Identifiers: 794826, 803496, VIGILANCE-VUL-12342.

Description of the vulnerability

An attacker can use a malicious Microsoft Excel XLSX file, in order to generate two denials of service in McAfee Security for Microsoft Exchange.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2013-0393 CVE-2013-0418

Oracle Outside In Technology: several vulnerabilities of January 2013

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are fixed by the CPU of January 2013.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 16/01/2013.
Revision date: 18/01/2013.
Identifiers: 2809279, BID-57357, BID-57364, CERTA-2013-AVI-041, CERTA-2013-AVI-116, cpujan2013, CVE-2013-0393, CVE-2013-0418, MS13-012, VIGILANCE-VUL-12333, ZDI-13-001.

Description of the vulnerability

A Critical Patch Update fixes several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can create malicious Paradox data, in order to force the vspdx.dll library to read at an invalid memory address, which leads to a denial of service. [severity:2/4; BID-57357, CVE-2013-0393]

An attacker can create malicious Paradox data, in order to trigger a buffer overflow in the vspdx.dll library, which can lead to code execution. [severity:3/4; BID-57364, CVE-2013-0418]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2012-3214 CVE-2012-3217

Oracle Outside In Technology: several vulnerabilities of October 2012

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are corrected by the CPU of October 2012.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 2/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 17/10/2012.
Identifiers: 2784242, BID-55977, BID-55993, CERTA-2012-AVI-578, CERTA-2013-AVI-117, cpuoct2012, CVE-2012-3214, CVE-2012-3217, MS13-013, PRL-2012-30, VIGILANCE-VUL-12076.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can create a malicious JPG image, which generates an error in the ibjpg2.flt filter, in order to create a denial of service. [severity:2/4; BID-55977, CVE-2012-3214, PRL-2012-30]

An attacker can use a vulnerability of Outside In HTML Export SDK, in order to create a denial of service. [severity:2/4; BID-55993, CVE-2012-3217]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2012-3488 CVE-2012-3489

PostgreSQL: file access via XML and XSLT

Synthesis of the vulnerability

An attacker can transmit a malicious XML/XSLT file to PostgreSQL, in order to read a file, or to write to a file.
Impacted products: Debian, Fedora, Mandriva Linux, McAfee Security for Email Servers, openSUSE, Solaris, PostgreSQL, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 17/08/2012.
Identifiers: BID-55072, BID-55074, CERTA-2012-AVI-455, CVE-2012-3488, CVE-2012-3489, DSA-2534-1, FEDORA-2012-12156, FEDORA-2012-12165, MDVSA-2012:139, openSUSE-SU-2012:1251-1, openSUSE-SU-2012:1288-1, openSUSE-SU-2012:1299-1, RHSA-2012:1263-01, RHSA-2012:1264-01, SUSE-SU-2012:1021-1, SUSE-SU-2012:1336-1, VIGILANCE-VUL-11867.

Description of the vulnerability

The PostgreSQL service can process XML/XSLT data. Two vulnerabilities can occur when these data are processed.

An XSLT (transformation) style sheet can contain commands to read or write in external files. For example, "<sax:output ..." (SAXON) indicates the name of a file where to write to. However, the xslt_process() function of the contrib/xml2 module does not disable this feature. [severity:2/4; BID-55072, CVE-2012-3488]

An XML file can contain external entities (DTD) reading a file. For example "<!ENTITY name SYSTEM "file">". However, the xml_parse() function of PostgreSQL does not disable this feature. [severity:2/4; BID-55074, CVE-2012-3489]

An attacker can therefore transmit a malicious XML/XSLT file to PostgreSQL, in order to read a file, or to write to a file.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2012-1744 CVE-2012-1766 CVE-2012-1767

Oracle Outside In Technology: several vulnerabilities of July 2012

Synthesis of the vulnerability

Several vulnerabilities of Oracle Outside In Technology are corrected by the CPU of July 2012.
Impacted products: McAfee Email and Web Security, GroupShield, McAfee Security for Email Servers, Exchange, MOSS, Oracle OIT, Symantec Enterprise Vault.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 14.
Creation date: 25/07/2012.
Identifiers: 2737111, 2740358, 2742321, BID-54497, BID-54500, BID-54504, BID-54506, BID-54511, BID-54531, BID-54536, BID-54541, BID-54543, BID-54546, BID-54548, BID-54550, BID-54552, BID-54554, CERTA-2012-ALE-004, CERTA-2012-AVI-393, CERTA-2012-AVI-441, CERTA-2012-AVI-541, CERTA-2012-AVI-557, cpujul2012, CVE-2012-1744, CVE-2012-1766, CVE-2012-1767, CVE-2012-1768, CVE-2012-1769, CVE-2012-1770, CVE-2012-1771, CVE-2012-1772, CVE-2012-1773, CVE-2012-3106, CVE-2012-3107, CVE-2012-3108, CVE-2012-3109, CVE-2012-3110, KB75998, MS12-058, MS12-067, PRL-2012-24, PRL-2012-25, PRL-2012-26, SYM12-015, VIGILANCE-VUL-11794, VU#118913.

Description of the vulnerability

A Critical Patch Update corrects several vulnerabilities of Oracle Outside In Technology. These libraries are used by several products, which are thus also impacted by these vulnerabilities.

An attacker can use a vulnerability of the CDR format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54531, CVE-2012-1766]

An attacker can use a vulnerability of the DOC format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54536, CVE-2012-1767]

An attacker can use a vulnerability of the DPT format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54511, CVE-2012-1768]

An attacker can use a vulnerability of the JP2 format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54500, CVE-2012-1769]

An attacker can use a vulnerability of the LWP format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54541, CVE-2012-1770]

An attacker can use a vulnerability of the ODG format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54543, CVE-2012-1771]

An attacker can use a vulnerability of the PCX format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54497, CVE-2012-1772]

An attacker can use a vulnerability of the PDF format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54548, CVE-2012-1773]

An attacker can use a vulnerability of the SAM format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54546, CVE-2012-3106]

An attacker can use a vulnerability of the SXD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54504, CVE-2012-3107]

An attacker can use a vulnerability of the SXI format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54550, CVE-2012-3108]

An attacker can use a vulnerability of the VSD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54554, CVE-2012-3109]

An attacker can use a vulnerability of the WSD format, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54506, CVE-2012-3110]

An attacker can use a vulnerability of Oracle Outside In Technology, in order to obtain information, to alter information, or to create a denial of service. [severity:3/4; BID-54552, CVE-2012-1744]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2009-1348

F-Secure, McAfee, Symantec: bypassing via PDF

Synthesis of the vulnerability

An attacker can create a malicious PDF document which is not detected by F-Secure, McAfee and Symantec products.
Impacted products: F-Secure AV, GroupShield, McAfee Security for Email Servers, VirusScan, Norton Antivirus, Norton Internet Security, Symantec AV.
Severity: 2/4.
Consequences: data flow.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 3.
Creation date: 28/10/2009.
Identifiers: BID-36848, BID-36876, CERTA-2009-AVI-172, CVE-2009-1348, FSC-2009-3, G-SEC 47-2009, G-SEC 48-2009, G-SEC 49-2009, SB10003, VIGILANCE-VUL-9133.

Description of the vulnerability

A PDF document can be especially constructed to be read by Adobe Reader, but to be unrecognized by an antivirus software. An attacker can create such a document, and thus bypass products of three editors.

A malicious PDF document is not detected by Symantec and Norton products. [severity:2/4; G-SEC 47-2009]

A malicious PDF document is not detected by F-Secure products. [severity:2/4; BID-36876, FSC-2009-3, G-SEC 48-2009]

A malicious PDF document is not detected by McAfee products. A malicious TAR archive is also not detected by McAfee products. [severity:2/4; BID-36848, CERTA-2009-AVI-172, CVE-2009-1348, G-SEC 49-2009, SB10003]

An attacker can therefore create a malicious PDF document which is not detected by F-Secure, McAfee and Symantec products.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about McAfee Security for Email Servers: