First published: Wed Aug 22 2012(Updated: )
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Email and Web Security | =5.0 | |
McAfee Email and Web Security | =5.5 | |
McAfee Email and Web Security | =5.6 | |
McAfee Email Gateway | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4581 is rated as medium severity due to session hijacking risks.
CVE-2012-4581 affects McAfee Email and Web Security 5.x versions before 5.5 Patch 6 and 5.6 before Patch 3, as well as McAfee Email Gateway 7.0 before Patch 1.
To fix CVE-2012-4581, update McAfee Email and Web Security to version 5.5 Patch 6 or 5.6 Patch 3, and McAfee Email Gateway to version 7.0 Patch 1.
CVE-2012-4581 could be exploited by attackers to hijack sessions through improper session token management.
Currently, there are no official workarounds for CVE-2012-4581 other than applying the required updates.