TITLE: MailManager PostgreSQL Encoding-Based SQL Injection SECUNIA ADVISORY ID: SA20303 VERIFY ADVISORY: http://secunia.com/advisories/20303/ CRITICAL: Moderately critical IMPACT: Manipulation of data WHERE: >From remote SOFTWARE: MailManager 2.x http://secunia.com/product/10160/ DESCRIPTION: A vulnerability has been reported in MailManager, which potentially can be exploited by malicious people to conduct SQL injection attacks. Input passed to unspecified parameters isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code that contains certain multi-byte characters. For more information: SA20231 Successful exploitation requires that the PostgreSQL database is used. The vulnerability has been reported in version 2.0.9 and prior. SOLUTION: Update to version 2.0.10. http://sourceforge.net/project/showfiles.php?group_id=85788 PROVIDED AND/OR DISCOVERED BY: Reported by vendor. ORIGINAL ADVISORY: http://sourceforge.net/tracker/index.php?func=detail&aid=1494281&group_id=85788&atid=577305 http://sourceforge.net/project/shownotes.php?release_id=419822&group_id=85788 OTHER REFERENCES: SA20231: http://secunia.com/advisories/20231/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------