First published: Thu Feb 01 2018(Updated: )
Configuration file injection leading to Code Execution as Root in Kaspersky Secure Mail Gateway version 1.1.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Secure Mail Gateway | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6289 is considered critical due to its potential for remote code execution as root.
The recommended fix for CVE-2018-6289 is to update Kaspersky Secure Mail Gateway to a patched version.
CVE-2018-6289 allows attackers to inject configuration files, potentially leading to full system compromise.
CVE-2018-6289 specifically affects Kaspersky Secure Mail Gateway version 1.1.
CVE-2018-6289 is classified as a configuration file injection vulnerability.