Open WebMail Arbitrary Command Execution

The target is running at least one instance of Open WebMail in which the component fails to sufficiently validate user input. This failure enables remote attackers to execute arbitrary programs on a target using the privileges under which the web server operates. For further information, see : If safe_checks are disabled, OVS attempts to create the file /tmp/openvas_openwebmail_vacation_input_validation on the target.
Upgrade to Open WebMail version 2.32 20040629 or later.