First published: Wed Aug 22 2012(Updated: )
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not properly encrypt system-backup data, which makes it easier for remote authenticated users to obtain sensitive information by reading a backup file, as demonstrated by obtaining password hashes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Email and Web Security | =5.0 | |
McAfee Email and Web Security | =5.5 | |
McAfee Email and Web Security | =5.6 | |
McAfee Email Gateway | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4584 is classified as a medium severity vulnerability due to the risks associated with improper encryption of backup data.
To address CVE-2012-4584, upgrade McAfee Email and Web Security to version 5.5 Patch 6 or 5.6 Patch 3, or McAfee Email Gateway to version 7.0 Patch 1.
CVE-2012-4584 affects users of McAfee Email and Web Security versions earlier than 5.5 Patch 6 and 5.6 Patch 3, as well as McAfee Email Gateway version 7.0 before Patch 1.
Due to CVE-2012-4584, sensitive information in system-backup files may be exposed to remote authenticated users.
While the best solution is to update the software to the latest versions, ensure that access to backup files is strictly controlled as a temporary workaround.