CVE-2012-4581
Published Aug 22, 2012
Last updated 12 years ago
Overview
- Description
- McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66A3B3D7-D6F2-4AE9-89BA-3B39896D6DBE" }, { "criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8E57CF1-7D4D-45E9-A74D-51D6C7940F26" }, { "criteria": "cpe:2.3:a:mcafee:email_and_web_security:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36F5B0E9-0B28-4DAD-91C9-0E722D79AC46" }, { "criteria": "cpe:2.3:a:mcafee:email_gateway:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46F5DE96-C4C2-498A-AD79-82BEC9A7DF5B" } ], "operator": "OR" } ] } ]