First published: Mon Aug 07 2006(Updated: )
Multiple directory traversal vulnerabilities in Symantec Brightmail AntiSpam (SBAS) before 6.0.4, when the Control Center is allowed to connect from any computer, allow remote attackers to read and overwrite certain files via directory traversal sequences in (1) DATABLOB-GET and (2) DATABLOB-SAVE requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Brightmail AntiSpam | =6.0 | |
Symantec Brightmail AntiSpam | =5.5 | |
Symantec Brightmail AntiSpam | =4.0 | |
Symantec Brightmail AntiSpam | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4013 has a medium severity rating due to its ability to allow unauthorized remote file access.
To mitigate CVE-2006-4013, upgrade to Symantec Brightmail AntiSpam version 6.0.4 or later.
CVE-2006-4013 affects Symantec Brightmail AntiSpam versions 4.0, 5.5, and 6.0 up to 6.0.3.
Exploitation of CVE-2006-4013 can allow attackers to read and overwrite critical files on the affected systems.
While CVE-2006-4013 was reported in 2006, it can still pose a risk for users of outdated versions of Symantec Brightmail AntiSpam.