[Vulnerable] McAfee VirusScan...

15/09/2004 - 21:25 por anonymous | Informe spam
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-[Sigue la conversacion en]: microsoft.public.es.seguridad

Preguntas similare

Leer las respuestas

#21 Verhexen
15/09/2004 - 22:45 | Informe spam
que le encuentra de raro/curioso/malo u ofensivo a una versión de outlook de w2004 sp4?? no nada mas existe el xp... aps.. equispe para usted...

Verhexen.
XP service pack 2



"Ille Corvus" wrote in message news:
"Marc [MVP Windows]" escribio en mensaje
:

xDDDDDD



¿Se rie de esto?
X-Newsreader: Microsoft Outlook Express 6.00.2800.1437


Meritorios de Filtrado (Kill-File Global):
tella llop, jm (N.B. 2003.10.25)


«Ley de la persistencia de los problemas: Los problemas ni se crean, ni se destruyen, solo se transforman.»
Respuesta Responder a este mensaje
#22 Verhexen
15/09/2004 - 22:54 | Informe spam
XDDDD

Verhexen.
XP service pack 2



"Marc [MVP Windows]" wrote in message news:
Anda, si me había respondido "eso"... Tendré que bajar el nivel tope5 de mis filtros XeKisianos..

Creo que ni para saber qué SO estoy usando llega "eso": Juas!!!


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

"Verhexen" escribió en el mensaje news:
que le encuentra de raro/curioso/malo u ofensivo a una versión de outlook de w2004 sp4?? no nada mas existe el xp... aps.. equispe para usted...

Verhexen.
XP service pack 2



"Ille Corvus" wrote in message news:
"Marc [MVP Windows]" escribio en mensaje
:

xDDDDDD



¿Se rie de esto?
X-Newsreader: Microsoft Outlook Express 6.00.2800.1437


Meritorios de Filtrado (Kill-File Global):
tella llop, jm (N.B. 2003.10.25)


«Ley de la persistencia de los problemas: Los problemas ni se crean, ni se destruyen, solo se transforman.»
Respuesta Responder a este mensaje
#23 Ivan
15/09/2004 - 23:55 | Informe spam
Contemporaneo con el Windows 98 del posteador.

[Sigue la conversacion en]: es.misc.jardineria



McAfee VirusScan System Tray Applet Lets Local Users


Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...011272.htm


l


SecurityTracker URL: http://securitytracker.com/id?


1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system,


Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee


VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in


McAfee
VirusScan by accessing the System Scan properties from


the system tray
applet. Under the 'Report' tab, a local user can


select 'Browse' and
then open 'cmd.exe' in the Windows system directory to


obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September


2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?


id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating


system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this


entry.

The report indicates that in more recent versions of the


product, the
user interface has changed and no longer allows this


exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

Respuesta Responder a este mensaje
#24 Ramón Sola [MVP Windows Client]
16/09/2004 - 01:51 | Informe spam
Hash: SHA1

#include <ntddk.h>
#include "ille_corvus.h"
#define ILLE_CORVUS_STUCK_IN_FOOLISHNESS 0xDDDDDDDD

int KeTeCallesKarmele(CORVUS *Ille)
{
if (Ille != NULL && Ille->IsJoker)
{
KeBugCheckEx(ILLE_CORVUS_STUCK_IN_FOOLISHNESS,
Ille->EquispeNonsense, Ille->SecondLevelDataCacheFallacy, Ille->DisableHT,
Ille->KerioOutpostBetterThanXPFirewall);
}
else
{
DbgPrint("...all right, pingüino Rodríguez...");
return TRUE;
}
}

Ramón Sola @ Málaga (España) / MVP Windows - Shell/User
(quitar "IFeelGreat")

escribió en el mensaje
news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html



[...]

Respuesta Responder a este mensaje
#25 Jorge Andrés Riquelme Vargas
16/09/2004 - 07:51 | Informe spam
Aprovechando las bromas, pregunto:

¿Como es McAfee Internet Security 6.0?

Necesito un AntiVirus y un Firewall, entre otros productos.

Gracias. :)

escribió en el mensaje
news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-> [Sigue la conversacion en]: microsoft.public.es.seguridad
Respuesta Responder a este mensaje
Ads by Google
Help Hacer una preguntaSiguiente AnteriorRespuesta Tengo una respuesta
Search Busqueda sugerida