Secunia Research: Macallan Mail Solution IMAP Commands Directory Traversal

====================================================================== 

                     Secunia Research 17/02/2006

     - Macallan Mail Solution IMAP Commands Directory Traversal -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

====================================================================== 
1) Affected Software 

* Macallan Mail Solution version 4.8.03.025

Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Moderately Critical
Impact: Security Bypass
        Exposure of sensitive information
Where:  Remote

====================================================================== 
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Macallan Mail
Solution, which can be exploited by malicious users to bypass certain 
security restrictions and to gain access to potentially sensitive
information.

The vulnerability is caused due to directory traversal errors in
the CREATE, SELECT, DELETE and RENAME commands of the IMAP
service. This can be exploited by an authenticated user to read other
users' emails, create/rename arbitrary directories on the system, 
and delete empty directories.

====================================================================== 
4) Solution 

Update to version 4.8.05.004.

====================================================================== 
5) Time Table 

09/02/2006 - Initial vendor notification.
09/02/2006 - Initial vendor reply.
17/02/2006 - Public disclosure.

====================================================================== 
6) Credits 

Discovered by Secunia Research.

====================================================================== 
7) References

No other references.

====================================================================== 
8) About Secunia 

Secunia collects, validates, assesses, and writes advisories regarding 
all the latest software vulnerabilities disclosed to the public. These 
advisories are gathered in a publicly available database at the 
Secunia website: 

http://secunia.com/

Secunia offers services to our customers enabling them to receive all 
relevant vulnerability information to their specific system 
configuration. 

Secunia offers a FREE mailing list called Secunia Security Advisories: 

http://secunia.com/secunia_security_advisories/

====================================================================== 
9) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2006-4/advisory/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================