McAfee Web Gateway 7.6.x < / 7.7.x < Multiple Vulnerabilities (SB10205)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote host running McAfee Web Gateway is affected by multiple
code execution vulnerabilities.

Description :

The remote host is running a version of McAfee Web Gateway (MWG) that
is affected by multiple security vulnerabilities :

- A memory corruption flaw exists in unrar before 5.5.5, as used in
Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other
products that allows remote attackers to execute arbitrary code.

- A memory corruption flaw exists in Linux Kernel versions 4.11.5
and earlier that allows remote attacks to execute arbitrary code
with elevated privileges.(CVE-2017-1000364)

- A memory corruption flaw exists in the handling of LD_LIBRARY_PATH
that allows a remote attacker to manipulate the heap/stack that
may lead to arbitrary code execution. This issue only affects GNU
glibc 2.25 and prior. (CVE-2017-1000366)

- An input validation flaw exists in Todd Miller's sudo version
1.8.20p1 and earlier that results in information disclosure and
arbitrary command execution. (CVE-2017-1000368)

See also :

Solution :

Upgrade to McAfee
Web Gateway / or later.

Risk factor :

High / CVSS Base Score : 7.6

Family: Misc.

Nessus Plugin ID: 102496 ()

Bugtraq ID:

CVE ID: CVE-2012-6706

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now