Knowledge Center

McAfee Security Bulletin - Email Gateway update fixes XSS vulnerability (CVE-2015-1619)
Security Bulletins ID:   SB10099
Last Modified:  5/11/2017


 Who Should Read This Document:  Technical and Security Personnel
 Impact of Vulnerability:  Reflected Cross-Site Scripting (XSS) (CWE-79)
 CVE Numbers:  CVE-2015-1619
 CERT/CC and Other Numbers:  None
 Severity Rating:  Medium
 Base / Overall CVSS Scores:  6.0 / 5.0
 Recommendations:  Install the patches
 Security Bulletin Replacement:  None
 Caveats:  None
 Affected Software:
  • MEG 7.6
  • MEG 7.5
  • MEG 7.0
  • MEG 5.6
 Location of Updated Software:  http://www.mcafee.com/us/downloads/downloads.aspx

To receive email notification when this article is updated, click Subscribe on the right side of the page. You must be logged on to subscribe.

Article contents:


McAfee Email Gateway (MEG) has a Secure Web Mail Client user interface for viewing and composing secure emails. This interface is susceptible to a Reflected Cross Site Scripting (XSS) attack.

Cross-site scripting (XSS) vulnerability in the Secure Web Mail Client user interface in McAfee Email Gateway (MEG) 7.6.x before, 7.5.x before 75.6, 7.0.x through 7.0.5, 5.6, and earlier allows remote authenticated users to inject arbitrary web script or HTML via unspecified tokens in Digest messages.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'); Type 1: Reflected XSS (or Non-Persistent)
Affected Components:
  • McAfee Secure Web Mail Client
This issue is resolved in McAfee Email Gateway released on January 14, 2015 and McAfee Email Gateway 7.5.6 released on January 6, 2015.


Go to the McAfee Downloads site and download the applicable product patch/hotfix file:
Product Type Patch Version Release Date
McAfee Email Gateway Patch January 14, 2015
McAfee Email Gateway Patch 7.5.6  January 6, 2015
McAfee Email Gateway Hotfix 7.0.5h1021346 Scheduled for late January 2015
McAfee Email Gateway Hotfix 5.6h1021351 Scheduled for late January 2015

McAfee Product Download Instructions
  1. Launch Internet Explorer.
  2. Navigate to: http://www.mcafee.com/us/downloads/downloads.aspx.
  3. Provide your valid McAfee Grant Number.
  4. Click your product suite.
  5. Click the applicable product (see table above) and click I Agree.
  6. Click the Patches tab and click the link to download the product .ZIP file under the Product column.
For instructions on how to download McAfee products, documentation, security updates, patches, or hotfixes, see: KB56057.

For instructions on how to install/upgrade this hotfix/patch, please review the Release Notes and the Installation Guide (which you can download from the Documentation tab) following the same steps above.


None. Install the provided version updates.


McAfee credits François Goichon from Context Information Security for reporting this flaw.


Corporate Technical Support:

Frequently Asked Questions (FAQs)

What is affected by this security vulnerability?
McAfee Email Gateway (MEG) is affected.

Affected Versions:


  • and earlier
  • 7.5.5 and earlier
  • 7.0.5 and earlier
  • 5.6 and earlier
Protected Versions:
  • and later
  • 7.5.6 and later
  • 7.0.5 Hotfix 1021346 and later (when available)
  • 5.6 Hotfix 1021351 and later (when available)
McAfee recommends that all customers verify that they have applied the latest updates.

What issue does this hotfix/patch address?
1021041 – Certain tokens in Digest messages are not escaped.

Does this vulnerability affect McAfee enterprise products?
Yes, McAfee Email Gateway is an enterprise product.

How do I know if my McAfee product is vulnerable or not?
For Appliances:
Use the following instructions for Appliance based products:
  1. Open the Administrator's User Interface (UI).
  2. Click the About link. The product version is displayed.
What is CVSS?
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/.

What are the CVSS scoring metrics that have been used?


 Base Score 6.0
 Related exploit range (AccessVector) Network
 Attack complexity (AccessComplexity) Medium
 Level of authentication needed (Authentication) Single
 Confidentiality impact Partial
 Integrity impact Partial
 Availability impact Partial
 Temporal Score (Overall) 5.0
 Availability of exploit (Exploitability) Functional exploit exists
 Type of fix available (RemediationLevel) Official fix
 Level of verification that vulnerability exists (ReportConfidence) Confirmed

NOTE: CVSS version 2.0 was used to generate this score.

What has McAfee done to resolve the issue?
McAfee released two patches to address this security flaw.  Two hotfixes for older versions are under development.

Where do I download the fix?
You can download the fix from: http://www.mcafee.com/us/downloads/downloads.aspx.
Users will need to provide their McAfee Grant Number to initiate the download.

How does McAfee respond to this and any other security flaws?
McAfee’s key priority is the security of our customers. In the event that a vulnerability is found within any of McAfee’s software, we work closely with the relevant security research group to ensure rapid and effective development of a fix and communication plan.

McAfee only publishes product vulnerability bulletins together with an actionable workaround, hotfix, patch, or version update; otherwise we would simply be informing the hacker community that our products are a target, putting our customers at greater risk. 

McAfee may publish lists of known vulnerable and not vulnerable products if the product vulnerability is already generally known publicly, but no actionable workaround is ready yet.
Where can I find a list of all Security Bulletins?
To view all published Security Bulletins, visit the McAfee ServicePortal at https://mysupport.mcafee.com, click Knowledge Center, and select Security Bulletins in the left navigation pane under Content Source. Alternatively, you can use this link: https://support.mcafee.com/ServicePortal/faces/knowledgecenter?s=true&lang=en-us&sm=false&tab=SCtdl&facets=Security+Bulletin@INQUIRA_TYPE&sb=mostViewed&sbv=numberofviews%3Anumberdecreasing&scps=q.
If you know the Security Bulletin ID, use the following link after replacing the example Security Bulletin ID (SB10071) with the Security Bulletin ID you are searching for: https://kc.mcafee.com/corporate/index?page=content&id=SB10071.
How do I report a product vulnerability?
If you have information about a security issue or vulnerability with a McAfee product, please visit our product security website at: http://www.mcafee.com/us/threat-center/product-security-bulletins.aspx#=tab-vulnerability.


For contact details: Go to http://www.mcafee.com/us/about/contact/index.html. Non-US customers - select your country from the list of Worldwide Offices.

Log into the McAfee Technical Support ServicePortal at https://mysupport.mcafee.com:
  • If you are a registered user, type your User ID and Password and click Log In.
  • If you are not a registered user, click Register and complete the required fields. Your password and login instructions will be emailed to you.
To download McAfee products, updates, and documentation, visit the Downloads page at http://www.mcafee.com/us/downloads/downloads.aspx. For instructions on downloading, see KB56057.

To download new Beta software or to read about the latest Beta information, go to http://www.mcafee.com/us/downloads/beta-programs/index.aspx.

To submit Beta feedback on any McAfee product, email: mcafee_beta@mcafee.com.

For copyright, trademark attributions, and license information, go to http://us.mcafee.com/root/aboutUs.asp?id=copyright.

For patents protecting this product, see your product documentation.


The information provided in this security bulletin is provided as is without warranty of any kind. McAfee disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall McAfee or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if McAfee or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Any future product release dates mentioned in this bulletin are intended to outline our general product direction and they should not be relied on in making a purchasing decision. The product release dates are for information purposes only, and may not be incorporated into any contract. The product release dates are not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion and may be changed or cancelled at any time.

Rate this document


This article is available in the following languages:

English United States

Glossary of Technical Terms

 Highlight Glossary Terms

Please take a moment to browse our Glossary of Technical Terms.