[Vulnerable] McAfee VirusScan...

15/09/2004 - 21:25 por anonymous | Informe spam
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-[Sigue la conversacion en]: microsoft.public.es.seguridad

Preguntas similare

Leer las respuestas

#6 Marc [MVP Windows]
15/09/2004 - 21:35 | Informe spam
Que recuerde, el 4.5.1 sin el SP1, no se llevaba bien con XP... y creo que está descatalogado. Por aquí teníamos la 7.0 EE hace unos meses


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

"JM Tella Llop [MVP Windows]" escribió en el mensaje news:
ende luego.. el Ille ya está deseperao... XDDDDDDDDDDD

Jose Manuel Tella Llop
MVP - Windows
(quitar XXX)
http://www.multingles.net/jmt.htm

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.



"Marc [MVP Windows]" wrote in message news:
McAfee VirusScan version 4.5.1



xDDDDDD


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

escribió en el mensaje news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-> [Sigue la conversacion en]: microsoft.public.es.seguridad
Respuesta Responder a este mensaje
#7 Marc [MVP Windows]
15/09/2004 - 21:35 | Informe spam
Que recuerde, el 4.5.1 sin el SP1, no se llevaba bien con XP... y creo que está descatalogado. Por aquí teníamos la 7.0 EE hace unos meses


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

"JM Tella Llop [MVP Windows]" escribió en el mensaje news:
ende luego.. el Ille ya está deseperao... XDDDDDDDDDDD

Jose Manuel Tella Llop
MVP - Windows
(quitar XXX)
http://www.multingles.net/jmt.htm

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.



"Marc [MVP Windows]" wrote in message news:
McAfee VirusScan version 4.5.1



xDDDDDD


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

escribió en el mensaje news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-> [Sigue la conversacion en]: microsoft.public.es.seguridad
Respuesta Responder a este mensaje
#8 Marc [MVP Windows]
15/09/2004 - 21:35 | Informe spam
Que recuerde, el 4.5.1 sin el SP1, no se llevaba bien con XP... y creo que está descatalogado. Por aquí teníamos la 7.0 EE hace unos meses


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

"JM Tella Llop [MVP Windows]" escribió en el mensaje news:
ende luego.. el Ille ya está deseperao... XDDDDDDDDDDD

Jose Manuel Tella Llop
MVP - Windows
(quitar XXX)
http://www.multingles.net/jmt.htm

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

This posting is provided "AS IS" with no warranties, and confers no rights.
You assume all risk for your use.



"Marc [MVP Windows]" wrote in message news:
McAfee VirusScan version 4.5.1



xDDDDDD


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

escribió en el mensaje news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-> [Sigue la conversacion en]: microsoft.public.es.seguridad
Respuesta Responder a este mensaje
#9 Ille Corvus
15/09/2004 - 21:39 | Informe spam
"Marc [MVP Windows]" escribio en mensaje
:

xDDDDDD



¿Se rie de esto?
X-Newsreader: Microsoft Outlook Express 6.00.2800.1437


Meritorios de Filtrado (Kill-File Global):
tella llop, jm (N.B. 2003.10.25)


«Ley de la persistencia de los problemas: Los problemas ni se crean, ni se destruyen, solo se transforman.»
Respuesta Responder a este mensaje
#10 Enrique [MVP Windows]
15/09/2004 - 21:41 | Informe spam
Esa versión de McAfee VirusScan es del siglo pasado :-)))


Saludos,
Enrique Cortés
Microsoft MVP - Windows - IE/OE


Instala ya mismo el Service Pack 2 (SP2), la actualización más importante para Windows XP, que
incluye todas las actualizaciones críticas hasta la fecha y protegerá tu seguridad en general
gracias a Windows Security Center. Haz clic en el siguiente enlace:
http://www.microsoft.com/downloads/...p;FamilyID9c9dbe-3b8e-4f30-8245-9e368d3cdb5a

Este mensaje se proporciona "como está", sin garantías de ninguna clase y no otorga ningún
derecho.
This posting is provided "AS IS" with no warranties, and confers no rights.

escribió en el mensaje
news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-[Sigue la conversacion en]: microsoft.public.es.seguridad
Respuesta Responder a este mensaje
Ads by Google
Help Hacer una preguntaSiguiente AnteriorRespuesta Tengo una respuesta
Search Busqueda sugerida