source: http://www.securityfocus.com/bid/827/info Mail-Gear, a multi-purpose filtering email server, includes a webserver for remote administration and email retrieval. This webserver is vulnerable to the '../' directory traversal attack. By including the string '../' in the URL, remote attackers can gain read access to all files on the filesystem that the server has read access to. http: //target.host:8003/Display?what=../../../../../autoexec.bat will display the server's autoexec.bat in a default NT installation.
Related ExploitsTrying to match CVEs (1): CVE-1999-0842
Trying to match OSVDBs (1): 1144
Other Possible E-DB Search Terms: symantec mail-gear 1.0, symantec mail-gear