> ----------------------------------------------------------------------
>
> TITLE:
> Symantec Brightmail AntiSpam Multiple Vulnerabilities
>
> SECUNIA ADVISORY ID:
> SA21223
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/21223/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Manipulation of data, Exposure of sensitive information, DoS
>
> WHERE:
> From remote
>
> SOFTWARE:
> Symantec Brightmail AntiSpam 6.x
> http://secunia.com/product/3656/
> Symantec Brightmail AntiSpam 5.x
> http://secunia.com/product/4628/
> Symantec Brightmail AntiSpam 4.x
> http://secunia.com/product/4627/
>
> DESCRIPTION:
> Some vulnerabilities have been reported in Symantec Brightmail
> AntiSpam, which can be exploited by malicious people to cause a DoS
> (Denial of Service) and overwrite or read sensitive information.
>
> 1) When installing e-mail scanners, it is possible to select an
> option that allows the Control Center to connect from any computer.
> If this option is selected, it is possible to impersonate the Control
> Center and cause the Brightmail AntiSpam service to stop responding by
> sending invalid posts.
>
> 2) Input passed in "DATABLOB-GET" and "DATABLOB-SAVE" requests is not
> properly sanitised. This can be exploited to overwrite or read some
> files on the system in combination with vulnerability #1.
>
> SOLUTION:
> Update to version 6.0.4 or upgrade to Symantec Mail Security for SMTP
> 5.0.
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits George A. Theall, Tenable Network Security.
>
> ORIGINAL ADVISORY:
> Symantec:
> http://securityresponse.symantec.com/avcenter/security/Content
> /2006.07.27.html
>