Your one-stop web resource providing safety and security information to manufacturers

Kaspersky Lab fixed its Secure Mail Gateway to mitigate vulnerabilities.

The Kaspersky Secure Mail Gateway is an integrated email system and security solution that employs anti-spam, anti-malware and anti-phishing.

Malwarebytes Fixes Bad Update
Firefox Updates its Update
ICS Spectre, Meltdown Update
New Linux Kernel Fixes Meltdown, Spectre

The vulnerabilities are cross-site request forgery, improper neutralization of special elements in output used by a downstream component, improper privilege management, and improper neutralization of input during web page generation. Core Security Technologies discovered the issues.

A remote attacker could exploit these issues to gain command execution as root, researchers said. The bugs were found in Kaspersky Secure Mail Gateway Other versions may be vulnerable, but they were not tested.

Cyber Security

Kaspersky Secure Mail Gateway comes with a Web Management Console to monitor the application status and manage operations, but has no cross-site request forgery protection site-wide, which could lead to administrative account takeover, Core Security researchers said in a post.

An attacker could submit authenticated requests when an authenticated user browses an attacker-controlled domain, the researchers said.

An attacker who accesses the Web Console could gain command execution as root through the injection of arbitrary content into the appliance’s Postfix configuration.

The console makes it possible to add a “BCC Address for all Messages,” a configuration parameter written verbatim to the appliance’s Postfix configuration file. When adding LF characters to it, an attacker could inject a configuration parameter to execute arbitrary commands on the appliance as root.

This allows the attacker to execute any binary on the system, but can’t pass arguments to it. However, it is possible to overcome this by abusing another Web Console functionality to upload a Python script to the file system, the researchers discovered.

The third issue could allow an attacker to elevate privileges from kluser to root by abusing a setuid binary shipped with the appliance and execute a script on the attacker-controlled location with root privileges.

Users should upgrade to the new release as soon as possible.

Pin It on Pinterest

Share This