McAfee ePolicy Orchestrator File Handling Flaw Lets Remote Users Create Arbitrary Files
SecurityTracker Alert ID: 1010110|
SecurityTracker URL: http://securitytracker.com/id/1010110
(Links to External Site)
Date: May 10 2004
Modification of system information, Modification of user information, Root access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2.5.0, 2.5.1 prior to Patch 14, 3.0 prior to Patch 4 for 3.0 SP2A|
A vulnerability was reported in McAfee ePolicy Orchestrator (ePO). A remote user can gain Administrator access on the target system.|
Internet Security Systems reported that a remote user can send a specially crafted HTTP POST request to the 'spipe/file handler' to create arbitrary files with arbitrary content on the target server. These files can then be executed with Administrator privileges on the target ePO server.
In addition, the report indicates that a remote user can create a malicious installation package that will be installed on ePO agent systems and potentially executed on the ePO agent systems.
The original advisory is available at:
A remote user can create and execute arbitrary files on the target system to gain Administrator privileges on the ePO server.|
A remote user that has compromised an ePO server may be able to push malicious code out to all connected ePO agents.
The vendor has released the following patches:|
Vendor URL: download.nai.com/products/patches/ePO/v2.x/Patch14.txt (Links to External Site)
Access control error|
|Underlying OS: Windows (NT), Windows (2000), Windows (2003)|
Source Message Contents
Subject: ISS Security Brief: McAfee ePolicy Orchestrator Remote Compromise|
-----BEGIN PGP SIGNED MESSAGE-----
Internet Security Systems Security Brief
May 10, 2004
McAfee ePolicy Orchestrator Remote Compromise Vulnerability
ISS X-Force has discovered a vulnerability in the McAfee ePolicy Orchestrator
software. ePolicy Orchestrator (ePO) enables the enterprise management of
all manner of security software, from virus and vulnerability scanners to
personal firewalls. The affected versions of ePO server contain a flaw that
can lead to arbitrary code execution on vulnerable systems.
Attackers may remotely exploit this vulnerability to gain Administrator
access to any vulnerable ePO server. In addition to the server, this
vulnerability can be used to gain access to ePO agent systems. The ePO
server is commonly used to distribute enterprise-wide updates for security
software, and as such this vulnerability opens up the potential for
enterprise-wide exploitation in certain configurations.
For the complete X-Force Advisory, please visit:
About Internet Security Systems (ISS)
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a
pioneer and world leader in software and services that protect critical
online resources from an ever-changing spectrum of threats and misuse.
Internet Security Systems is headquartered in Atlanta, GA, with
additional operations throughout the Americas, Asia, Australia, Europe
and the Middle East.
Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved
Permission is hereby granted for the electronic redistribution of this
document. It is not to be edited or altered in any way without the
express written consent of the Internet Security Systems X-Force. If you
wish to reprint the whole or any part of this document in any other
medium excluding electronic media, please email xforceiss.net for
Disclaimer: The information within this paper may change without notice.
Use of this information constitutes acceptance for use in an AS IS
condition. There are NO warranties, implied or otherwise, with regard to
this information or its use. Any use of this information is at the
user's risk. In no event shall the author/distributor (Internet Security
Systems X-Force) be held liable for any damages whatsoever arising out
of or in connection with the use or spread of this information.
X-Force PGP Key available on MIT's PGP key server and PGP.com's key server,
as well as at http://www.iss.net/security_center/sensitive.php
Please send suggestions, updates, and comments to: X-Force
xforceiss.net of Internet Security Systems, Inc.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----