McAfee VirusScan Enterprise 8.5 / 8.7 hcp:// Security Bypass

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host has an antivirus application that is affected by a
security bypass vulnerability.

Description :

The remote Windows host has McAfee VirusScan Enterprise version 8.5 or
8.7. It is, therefore, affected by a security bypass vulnerability due
to a failure to properly interact with the processing of 'hcp://' URLs.
This can lead to malware execution prior to detection.

See also :

https://kc.mcafee.com/corporate/index?page=content&id=SB10012

Solution :

Apply the patch from Microsoft Bulletin MS10-042 or enable VirusScan
Enterprise access protection rule 'Disable HCP URLs in Internet
Explorer' (requires Buffer Overflow and Access Protection DAT Version
516 or greater).

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 6.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 72216 ()

Bugtraq ID: 44184

CVE ID: CVE-2010-3496