Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   McAfee VirusScan Vendors:   McAfee
McAfee VirusScan ActiveX Controls Let Remote Users Access the Target User's System
SecurityTracker Alert ID:  1009956
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 27 2004
Impact:   User access via network
Exploit Included:  Yes  

Description:   A vulnerability was reported in McAfee VirusScan. A remote user may be able to access a target user's system.

Jonathan Payne reported that the software appears to install several non-secure ActiveX controls. A remote user can reportedly create HTML that, when loaded by the target user, will invoke the ActiveX controls and access the target user's system.

A demonstration exploit that accesses the target user's Windows registry is provided in the Source Message.

Impact:   A remote user can create HTML that, when loaded by the target user, will be able to access the target user's system.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  McAfee VirusScan installer uses insecure ActiveX controls

After installing the McAfree VirusScan, it appears that it is possible for
any web page to access the Windows regisry with the following HTML:

 <object classid="clsid:4C29D864-C55A-46DD-865C-17A1B7CC1A1A" id="gobjReg"
style="display: none;">
 <h1>McAfee installer test</h1>
 <script language="vbscript">
  document.write( _
   gobjReg.RegQueryValue( "HKCU\Control Panel\Desktop", "Wallpaper") _

(when viewed in IE 6 with default secutiry and with VirusScan installed,
this HTML displays the location of the current Windows desktop bitmap)

You can see this behaviour by selecting the 15-Day Free trial of McAfee
Virus scan from this page:
Then going through the account creation process and then clicking on the
download link.

The download page (the one with the "Start" button) appears to install a
number of ActiveX controls which are not secured in any way.  As well as the
registry one, there are controls for acessing the file system and for
configuring the operating system.

I have uploaded a full copy if the IDL for the installer objects here:
There appear to be lots more fun interfaces that I haven't tested yet.

Jonathan Payne

Earn up to 10 credit course hours toward the TruSecure ICSA Practitioner (TICSA) Credential and receive a TICSA exam coupon by attending
 the Infosecurity Canada 2004 conference.  Featured speaker, Marcus J. Ranum, TruSecure inventor of the proxy firewall will present
 on June 3 at 11:30 AM.  Visit <>  for certification details and <>  for
 conference information.  Become TICSA certified and see what happens!


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC