Symantec Messaging Gateway Directory Traversal (CVE-2012-4347)
| Check Point Reference: | CPAI-2013-413 | |
| Date Published: | ||
| Severity: | ||
| Source: | Symantec Advisory 56789 | |
| Industry Reference(s): | CVE-2012-4347 |
|
| Protection Provided by: |
Security Gateway
|
|
|
Who is Vulnerable? Symantec Messaging Gateway 9.5.x |
||
| Vulnerability Description Two directory traversal vulnerabilities have been reported in Symantec Messaging Gateway. |
||
|
Vulnerability Details The vulnerabilities are due to an input validation error when accepting user input. By sending crafted requests, a remote, authenticated attacker can exploit this vulnerability to disclosure sensitive information on the server. The vulnerability is triggered when the attacker sends a malicious request containing directory traversal characters to a vulnerable system. Successful exploitation can lead to disclose sensitive information on the server. |
Protection Overview
This protection will detect and block attempts to exploit these vulnerabilities.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.