Language:
http://www.nessus.org/u?97079438
https://www.securityfocus.com/archive/1/524191/30/0/threaded
https://www.securityfocus.com/archive/1/524192/30/0/threaded
https://www.securityfocus.com/archive/1/524193/30/0/threaded
https://www.securityfocus.com/archive/1/524876/30/0/threaded
https://www.securityfocus.com/archive/1/524877/30/0/threaded
https://www.securityfocus.com/archive/1/524878/30/0/threaded
https://www.securityfocus.com/archive/1/524879/30/0/threaded
Severity: High
ID: 62010
File Name: symantec_messaging_gateway_sym12-013.nasl
Version: 1.21
Type: remote
Family: CGI abuses
Published: 9/7/2012
Updated: 1/19/2021
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.9
Temporal Score: 6.5
Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2012-3579
CPE: cpe:/a:symantec:messaging_gateway
Required KB Items: www/sym_msg_gateway
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 8/27/2012
Vulnerability Publication Date: 8/27/2012
Core Impact
Metasploit (Symantec Messaging Gateway 9.5 Default SSH Password Vulnerability)
Elliot (Symantec Messaging Gateway 9.5.3 File Disclosure)
CVE: CVE-2012-0307, CVE-2012-0308, CVE-2012-3579, CVE-2012-3580, CVE-2012-3581, CVE-2012-4347