SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   McAfee ePolicy Orchestrator Vendors:   McAfee
McAfee ePolicy Orchestrator File Handling Flaw Lets Remote Users Create Arbitrary Files
SecurityTracker Alert ID:  1010110
SecurityTracker URL:  http://securitytracker.com/id/1010110
CVE Reference:   CVE-2004-0038   (Links to External Site)
Date:  May 10 2004
Impact:   Modification of system information, Modification of user information, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.5.0, 2.5.1 prior to Patch 14, 3.0 prior to Patch 4 for 3.0 SP2A
Description:   A vulnerability was reported in McAfee ePolicy Orchestrator (ePO). A remote user can gain Administrator access on the target system.

Internet Security Systems reported that a remote user can send a specially crafted HTTP POST request to the 'spipe/file handler' to create arbitrary files with arbitrary content on the target server. These files can then be executed with Administrator privileges on the target ePO server.

In addition, the report indicates that a remote user can create a malicious installation package that will be installed on ePO agent systems and potentially executed on the ePO agent systems.

The original advisory is available at:

http://xforce.iss.net/xforce/alerts/id/173

Impact:   A remote user can create and execute arbitrary files on the target system to gain Administrator privileges on the ePO server.

A remote user that has compromised an ePO server may be able to push malicious code out to all connected ePO agents.

Solution:   The vendor has released the following patches:

http://download.nai.com/products/patches/ePO/v2.x/Patch14.txt

http://download.nai.com/products/patches/ePO/v3.0/EPO3024.txt

http://www.networkassociates.com/us/downloads/updates/hotfixes.asp

Vendor URL:  download.nai.com/products/patches/ePO/v2.x/Patch14.txt (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (NT), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents

Subject:  ISS Security Brief: McAfee ePolicy Orchestrator Remote Compromise


-----BEGIN PGP SIGNED MESSAGE-----

Internet Security Systems Security Brief
May 10, 2004

McAfee ePolicy Orchestrator Remote Compromise Vulnerability

Synopsis:

ISS X-Force has discovered a vulnerability in the McAfee ePolicy Orchestrator 
software. ePolicy Orchestrator (ePO) enables the enterprise management of 
all manner of security software, from virus and vulnerability scanners to 
personal firewalls. The affected versions of ePO server contain a flaw that 
can lead to arbitrary code execution on vulnerable systems.

Impact:

Attackers may remotely exploit this vulnerability to gain Administrator 
access to any vulnerable ePO server. In addition to the server, this 
vulnerability can be used to gain access to ePO agent systems. The ePO 
server is commonly used to distribute enterprise-wide updates for security 
software, and as such this vulnerability opens up the potential for 
enterprise-wide exploitation in certain configurations.

For the complete X-Force Advisory, please visit:
http://xforce.iss.net/xforce/alerts/id/173

______ 


About Internet Security Systems (ISS) 
Founded in 1994, Internet Security Systems (ISS) (Nasdaq: ISSX) is a 
pioneer and world leader in software and services that protect critical 
online resources from an ever-changing spectrum of threats and misuse. 
Internet Security Systems is headquartered in Atlanta, GA, with 
additional operations throughout the Americas, Asia, Australia, Europe 
and the Middle East. 


Copyright (c) 2004 Internet Security Systems, Inc. All rights reserved 
worldwide. 


Permission is hereby granted for the electronic redistribution of this 
document. It is not to be edited or altered in any way without the 
express written consent of the Internet Security Systems X-Force. If you 
wish to reprint the whole or any part of this document in any other 
medium excluding electronic media, please email xforceiss.net for 
permission. 


Disclaimer: The information within this paper may change without notice. 
Use of this information constitutes acceptance for use in an AS IS 
condition. There are NO warranties, implied or otherwise, with regard to 
this information or its use. Any use of this information is at the 
user's risk. In no event shall the author/distributor (Internet Security 
Systems X-Force) be held liable for any damages whatsoever arising out 
of or in connection with the use or spread of this information. 
X-Force PGP Key available on MIT's PGP key server and PGP.com's key server, 
as well as at http://www.iss.net/security_center/sensitive.php 
Please send suggestions, updates, and comments to: X-Force 
xforceiss.net of Internet Security Systems, Inc. 




-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBQJ/VGzRfJiV99eG9AQH/3gP+O45IvM0keZnWBkXXWw5iUozmXhLODQVy
DmvrMgMYfyfM/ZnFGSW0etkXZ8DFqYGJD23c4+iOFHDZI/qy7quRwuJr3o9CpUyP
29Y0i2wZgU/0x6FPi+8Q+bhIkikegn6pEJ/+9OTOPvqVqC/YoCWK6oQRb/W/HUtX
pM0bJ8ikYEk=
=bPYG
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC