The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of McAfee Application Control

computer vulnerability 17515

McAfee Application Control: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of McAfee Application Control.
Impacted products: MAC.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, denial of service on service.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 5.
Creation date: 28/07/2015.
Identifiers: SA-20150728-0, VIGILANCE-VUL-17515.

Description of the vulnerability

Several vulnerabilities were announced in McAfee Application Control.

An attacker can use scinject.dll to exploit a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:2/4]

An attacker can generate a buffer overflow in ZIP, in order to trigger a denial of service, and possibly to run code. [severity:2/4]

An attacker can trigger a fatal error with an IOCTL, in order to trigger a denial of service. [severity:1/4]

An attacker can bypass security features in Application Whitelisting, in order to escalate his privileges. [severity:2/4]

An attacker can bypass security features of the Read/Write Protection, in order to escalate his privileges. [severity:1/4]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2014-9920

McAfee Application Control: code execution

Synthesis of the vulnerability

An attacker can create a malicious program, which is not detected by McAfee Application Control.
Impacted products: MAC.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: document.
Creation date: 03/07/2014.
Identifiers: CVE-2014-9920, SB10077, VIGILANCE-VUL-14993.

Description of the vulnerability

The McAfee Application Control product limits the execution of Windows programs.

However, a malformed executable program is perceived by McAfee Application Control as not executable, and it is thus not blocked.

An attacker can therefore create a malicious program, which is not detected by McAfee Application Control.
Full Vigil@nce bulletin... (Free trial)

vulnerability 14530

McAfee Application Control: privilege escalation

Synthesis of the vulnerability

A local privileged attacker can bypass McAfee Application Control, in order to escalate his privileges.
Impacted products: MAC.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, data creation/edition.
Provenance: privileged shell.
Creation date: 04/04/2014.
Identifiers: SB10069, VIGILANCE-VUL-14530.

Description of the vulnerability

The McAfee Application Control product is used to apply a security policy on applications.

However, a Windows administrator can bypass this security policy.

A local privileged attacker can therefore bypass McAfee Application Control, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2013-7460

McAfee Application Control: code execution on Linux

Synthesis of the vulnerability

When McAfee Application Control is installed on Linux, an authenticated attacker can change binaries, in order to execute malicious code.
Impacted products: MAC.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 06/11/2013.
Identifiers: CVE-2013-7460, SB10054, VIGILANCE-VUL-13713.

Description of the vulnerability

The McAfee Application Control product can be installed on Linux.

However, writing permissions are not correctly managed.

When McAfee Application Control is installed on Linux, an authenticated attacker can therefore change binaries, in order to execute malicious code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about McAfee Application Control: