Advisory Details

November 10th, 2006

Marshal MailMarshal ARJ Extraction Directory Traversal Vulnerability

ZDI-06-039
ZDI-CAN-003

CVE ID CVE-2006-5487
CVSS SCORE
AFFECTED VENDORS NetIQ
AFFECTED PRODUCTS MailMarshal
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 3877,3878. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Marshal MailMarshal (formerly of NetIQ). Authentication is not required to exploit this vulnerability.

The specific flaw exists within the extraction and scanning of ARJ compressed attachments. Due to incorrect sandboxing of extracted filenames that contain directory traversal modifiers such as "../", an attacker can cause an executable to be created in an arbitrary location.

While currently existing files can not be over written, an attacker may leverage this vulnerability in a number of ways. For example, by placing a malicious binary in the "all users" startup folder.

ADDITIONAL DETAILS NetIQ has issued an update to correct this vulnerability. More details can be found at:
http://www.marshal.com/kb/article.aspx?id=11450
DISCLOSURE TIMELINE
  • 2006-07-17 - Vulnerability reported to vendor
  • 2006-11-10 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES