[Vulnerable] McAfee VirusScan...

15/09/2004 - 21:25 por anonymous | Informe spam
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-[Sigue la conversacion en]: microsoft.public.es.seguridad
 

Leer las respuestas

#1 Marc [MVP Windows]
15/09/2004 - 21:29 | Informe spam
McAfee VirusScan version 4.5.1



xDDDDDD


Saludos

Marc
MCP - MVP Windows Shell/User
Oracle9i Certified Associate (OCA)
NOTA. Por favor, las preguntas y comentarios en los grupos, así nos beneficiamos todos.

Este mensaje se proporciona "como está" sin garantías de ninguna clase, y no otorga ningún derecho.

escribió en el mensaje news:
McAfee VirusScan System Tray Applet Lets Local Users Execute Commands
With SYSTEM Privileges
http://www.securitytracker.com/aler...11272.html


SecurityTracker URL: http://securitytracker.com/id?1011272
Date: Sep 15 2004
Impact: Execution of arbitrary code via local system, Root access via
local system
Exploit Included: Yes
Advisory: iDEFENSE
Version(s): 4.5.1

Description: A vulnerability was reported in McAfee VirusScan. A
local user can gain SYSTEM level privileges.

iDEFENSE reported that a local user can exploit a flaw in McAfee
VirusScan by accessing the System Scan properties from the system tray
applet. Under the 'Report' tab, a local user can select 'Browse' and
then open 'cmd.exe' in the Windows system directory to obtain a
command shell with SYSTEM privileges.

The vendor was notified on August 12, 2004 and September 2, 2004,
without response.

Ian Vitek is credited with discovering this flaw.

The original advisory is available at:

http://www.idefense.com/application/poi/display?id0&type=vulnerabilities
Impact: A local user can execute arbitrary operating system commands
with SYSTEM level privileges.

Solution: No solution was available at the time of this entry.

The report indicates that in more recent versions of the product, the
user interface has changed and no longer allows this exploit method.
Vendor URL: www.mcafee.com/ (Links to External Site)

Cause: Access control error

Underlying OS: Windows (2000), Windows (XP)

Message History: None.

-=-=-> [Sigue la conversacion en]: microsoft.public.es.seguridad

Preguntas similares