Secunia Research: MDaemon Content Filter Directory Traversal Vulnerability

======================================================================

                     Secunia Research 27/07/2005

    - MDaemon Content Filter Directory Traversal Vulnerability -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Credits..............................................................5
References...........................................................6
About Secunia........................................................7
Verification.........................................................8

======================================================================
1) Affected Software

Alt-N MDaemon Version 8.0.4

Prior versions may also be affected.

======================================================================
2) Severity

Rating: Highly critical
Impact: System access
        Manipulation of data
Where:  From remote

======================================================================
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in MDaemon, which can
be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an input validation error in
MDaemon's content filter. This can be exploited to write files to 
arbitrary directories via e.g. a specially crafted email containing 
a virus-infected attachment with directory traversal sequences in its 
filename (e.g. "../../../../../file.exe").

Successful exploitation causes the file to be quarantined to an 
arbitrary directory (e.g. the startup folder), but requires the 
attachment quarantine feature is enabled.

The vulnerability has been confirmed in version 8.0.4. Prior versions
may also be affected.

======================================================================
4) Solution

Update to version 8.1.0.

======================================================================
5) Credits

Discovered by Tan Chew Keong, Secunia Research.

======================================================================
6) References

Alt-N Technologies:
http://files.altn.com/MDaemon/Release/RelNotes_en.txt

======================================================================
7) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia web site:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
8) Verification

Please verify this advisory by visiting the Secunia web site:
http://secunia.com/secunia_research/2005-27/advisory/

Complete list of vulnerability reports released by Secunia Research:
http://secunia.com/secunia_research/

=====================================================================