The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of McAfee Virus Scan

computer vulnerability announce CVE-2018-6674

McAfee VirusScan Enterprise: privilege escalation via Configuration Information

Synthesis of the vulnerability

Impacted products: VirusScan.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, data reading.
Provenance: privileged account.
Confidence: confirmed by the editor (5/5).
Creation date: 11/05/2018.
Identifiers: CVE-2018-6674, SB10237, VIGILANCE-VUL-26117.

Description of the vulnerability

An attacker can bypass restrictions via Configuration Information of McAfee VirusScan Enterprise, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2017-3736

OpenSSL: Man-in-the-Middle via bn_sqrx8x_internal

Synthesis of the vulnerability

Impacted products: SDS, SNS, Blue Coat CAS, ProxyAV, ProxySG par Blue Coat, SGOS by Blue Coat, Debian, BIG-IP Hardware, TMOS, Fedora, FreeBSD, hMailServer, Domino, Notes, IRAD, Rational ClearCase, QRadar SIEM, Tivoli Storage Manager, WebSphere AS Traditional, WebSphere MQ, Juniper J-Series, Junos OS, NSM Central Manager, NSMXpress, SRX-Series, MariaDB ~ precise, McAfee Email Gateway, McAfee NSP, McAfee NTBA, VirusScan, McAfee Web Gateway, MySQL Community, MySQL Enterprise, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle Internet Directory, Solaris, Tuxedo, WebLogic, Percona Server, XtraDB Cluster, pfSense, RHEL, Slackware, stunnel, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, ProxySG by Symantec, SGOS by Symantec, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, X2GoClient.
Severity: 1/4.
Consequences: data reading, data creation/edition.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 02/11/2017.
Identifiers: 2012827, 2013025, 2014202, 2014651, 2014669, 2015080, bulletinapr2018, bulletinjan2018, CERTFR-2017-AVI-391, cpuapr2018, cpujan2018, cpujul2018, cpuoct2018, CVE-2017-3736, DSA-4017-1, DSA-4018-1, FEDORA-2017-4cf72e2c11, FEDORA-2017-512a6c5aae, FEDORA-2017-55a3247cfd, FEDORA-2017-7f30914972, FEDORA-2017-dbec196dd8, FreeBSD-SA-17:11.openssl, ibm10715641, ibm10719113, ibm10732391, ibm10733905, ibm10738249, ibm10738401, JSA10851, K14363514, openSUSE-SU-2017:3192-1, openSUSE-SU-2018:0029-1, openSUSE-SU-2018:0315-1, RHSA-2018:0998-01, RHSA-2018:2568-01, RHSA-2018:2575-01, SA157, SB10211, SB10220, SSA:2017-306-02, STORM-2017-006, SUSE-SU-2018:2839-1, SUSE-SU-2018:3082-1, TNS-2017-15, USN-3475-1, VIGILANCE-VUL-24316.

Description of the vulnerability

An attacker can act as a Man-in-the-Middle and use a carry error of bn_sqrx8x_internal() on OpenSSL, in order to read or write data in the session.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2016-8030

McAfee VirusScan Enterprise: memory corruption via IE Scriptscan COM Object

Synthesis of the vulnerability

Impacted products: VirusScan.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 12/04/2017.
Identifiers: CVE-2016-8030, SB10194, VIGILANCE-VUL-22423.

Description of the vulnerability

An attacker can generate a memory corruption via IE Scriptscan COM Object of McAfee VirusScan Enterprise, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2017-4028

McAfee Virus Scan Enterprise: privilege escalation via Registry Debugger

Synthesis of the vulnerability

Impacted products: VirusScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 31/03/2017.
Identifiers: CVE-2017-4028, SB10193, VIGILANCE-VUL-22299.

Description of the vulnerability

An attacker can bypass restrictions via Registry Debugger of McAfee Virus Scan Enterprise, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2017-5565 CVE-2017-5566 CVE-2017-5567

Antivirus: privilege escalation via Microsoft Application Verifier

Synthesis of the vulnerability

Impacted products: Avast AV, NOD32 Antivirus, F-Secure AV, AVG AntiVirus, McAfee MOVE AntiVirus, VirusScan, Norton Antivirus, Norton Internet Security, Panda AV, Panda Internet Security, TrendMicro Internet Security, OfficeScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Confidence: confirmed by the editor (5/5).
Creation date: 22/03/2017.
Identifiers: 1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211.

Description of the vulnerability

An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability 21380

McAfee VirusScan Enterprise for Windows: memory corruption via scriptproxy

Synthesis of the vulnerability

Impacted products: VirusScan.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, denial of service on server, denial of service on service.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 14/12/2016.
Revision date: 13/02/2017.
Identifiers: VIGILANCE-VUL-21380, VU#535111.

Description of the vulnerability

An attacker can generate a memory corruption via scriptproxy of McAfee VirusScan Enterprise for Windows, in order to trigger a denial of service, and possibly to run code.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2016-8016 CVE-2016-8017 CVE-2016-8018

McAfee VirusScan Enterprise: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of McAfee VirusScan Enterprise.
Impacted products: VirusScan.
Severity: 3/4.
Consequences: privileged access/rights, client access/rights, data reading, data creation/edition.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 12/12/2016.
Identifiers: CERTFR-2016-AVI-408, CVE-2016-8016, CVE-2016-8017, CVE-2016-8018, CVE-2016-8019, CVE-2016-8020, CVE-2016-8021, CVE-2016-8022, CVE-2016-8023, CVE-2016-8024, CVE-2016-8025, SB10181, VIGILANCE-VUL-21358, VU#245327, VU#535111.

Description of the vulnerability

Several vulnerabilities were announced in McAfee VirusScan Enterprise.

An attacker can bypass security features, in order to obtain sensitive information. [severity:1/4; CVE-2016-8016]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-8017]

An attacker can trigger a Cross Site Request Forgery, in order to force the victim to perform operations. [severity:2/4; CVE-2016-8018]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-8019]

An attacker can tamper with HTTP requests, in order to make a code generator run arbitrary code. [severity:3/4; CVE-2016-8020]

An attacker can make profit of a wrong signature check in order to tamper with sensitive files. [severity:2/4; CVE-2016-8021]

An attacker can spoof an identity, in order to run code. [severity:3/4; CVE-2016-8022]

An attacker can bypass security features, in order to escalate his privileges. [severity:3/4; CVE-2016-8023]

An attacker can tamper with end of lines of HTTP requests, in order to obtain sensitive information. [severity:3/4; CVE-2016-8024]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2016-8025]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2016-4534

McAfee VirusScan Enterprise: unlocking console

Synthesis of the vulnerability

A local attacker can bypass the password protection of the McAfee VirusScan Enterprise console, in order to alter the product configuration.
Impacted products: VirusScan.
Severity: 2/4.
Consequences: privileged access/rights.
Provenance: privileged shell.
Confidence: confirmed by the editor (5/5).
Creation date: 04/05/2016.
Identifiers: CVE-2016-4534, SB10158, VIGILANCE-VUL-19520.

Description of the vulnerability

The McAfee VirusScan Enterprise product has a console protected by a password.

However, a local attacker can close handles of mcconsole.exe, to unlock the console.

A local attacker can therefore bypass the password protection of the McAfee VirusScan Enterprise console, in order to alter the product configuration.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2016-3984

McAfee VirusScan Enterprise: bypassing of self-protection

Synthesis of the vulnerability

A local attacker can bypass the self-protection of McAfee VirusScan Enterprise, in order to elevate his privileges.
Impacted products: VirusScan.
Severity: 2/4.
Consequences: data creation/edition.
Provenance: privileged shell.
Confidence: confirmed by the editor (5/5).
Creation date: 26/02/2016.
Revision date: 07/03/2016.
Identifiers: CVE-2016-3984, SB10151, VIGILANCE-VUL-19035.

Description of the vulnerability

The McAfee VirusScan Enterprise product has a self-protection mechanism to forbid the local administrator from disabling the service.

However, a local attacker can bypass this mechanism and stop the antivirus.

A local attacker can therefore bypass the self-protection of McAfee VirusScan Enterprise, in order to elevate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2015-7547

glibc: buffer overflow of getaddrinfo

Synthesis of the vulnerability

An attacker, who owns a malicious DNS server, can reply with long data to a client application using the getaddrinfo() function of the glibc, in order to trigger a denial of service, and possibly to run code in the client application.
Impacted products: ArubaOS, Blue Coat CAS, Brocade Network Advisor, Brocade vTM, Cisco ASR, Cisco Catalyst, IOS XE Cisco, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Cisco Prime DCNM, Secure ACS, Cisco CUCM, Cisco IP Phone, Cisco Wireless IP Phone, Cisco Wireless Controller, XenDesktop, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, ExtremeXOS, BIG-IP Hardware, TMOS, Fedora, QRadar SIEM, Trinzic, NSM Central Manager, NSMXpress, McAfee Email Gateway, McAfee MOVE AntiVirus, VirusScan, McAfee Web Gateway, openSUSE, openSUSE Leap, Palo Alto Firewall PA***, PAN-OS, RealPresence Distributed Media Application, Polycom VBP, RHEL, ROX, RuggedSwitch, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware vSphere, VMware vSphere Hypervisor, WindRiver Linux.
Severity: 4/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 16/02/2016.
Revision date: 17/02/2016.
Identifiers: 046146, 046151, 046153, 046155, 046158, 1977665, 478832, 479427, 479906, 480572, 480707, 480708, ARUBA-PSA-2016-001, BSA-2016-003, BSA-2016-004, CERTFR-2016-AVI-066, CERTFR-2016-AVI-071, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, cisco-sa-20160218-glibc, CTX206991, CVE-2015-7547, ESA-2016-020, ESA-2016-027, ESA-2016-028, ESA-2016-029, ESA-2016-030, FEDORA-2016-0480defc94, FEDORA-2016-0f9e9a34ce, JSA10774, KB #4858, openSUSE-SU-2016:0490-1, openSUSE-SU-2016:0510-1, openSUSE-SU-2016:0511-1, openSUSE-SU-2016:0512-1, PAN-SA-2016-0021, RHSA-2016:0175-01, RHSA-2016:0176-01, RHSA-2016:0225-01, SA114, SB10150, SOL47098834, SSA:2016-054-02, SSA-301706, SUSE-SU-2016:0470-1, SUSE-SU-2016:0471-1, SUSE-SU-2016:0472-1, SUSE-SU-2016:0473-1, USN-2900-1, VIGILANCE-VUL-18956, VMSA-2016-0002, VMSA-2016-0002.1, VN-2016-003.

Description of the vulnerability

The glibc library implements a DNS resolver (libresolv).

An application can thus call the getaddrinfo() function, which queries DNS servers. When the AF_UNSPEC type is used in the getaddrinfo() call, two DNS A and AAAA queries are sent simultaneously. However, this special case, and a case with AF_INET6 are not correctly managed, and lead to an overflow if the reply coming from the DNS server is larger than 2048 bytes.

An attacker, who owns a malicious DNS server, can therefore reply with large data to a client application using the getaddrinfo() function of the glibc, in order to trigger a denial of service, and possibly to run code in the client application.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about McAfee Virus Scan: