McAfee Web Gateway 7.6.x < 7.6.2.15 / 7.7.x < 7.7.2.3 Multiple Vulnerabilities (SB10205)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host running McAfee Web Gateway is affected by multiple
code execution vulnerabilities.

Description :

The remote host is running a version of McAfee Web Gateway (MWG) that
is affected by multiple security vulnerabilities :

- A memory corruption flaw exists in unrar before 5.5.5, as used in
Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other
products that allows remote attackers to execute arbitrary code.
(CVE-2012-6706)

- A memory corruption flaw exists in Linux Kernel versions 4.11.5
and earlier that allows remote attacks to execute arbitrary code
with elevated privileges.(CVE-2017-1000364)

- A memory corruption flaw exists in the handling of LD_LIBRARY_PATH
that allows a remote attacker to manipulate the heap/stack that
may lead to arbitrary code execution. This issue only affects GNU
glibc 2.25 and prior. (CVE-2017-1000366)

- An input validation flaw exists in Todd Miller's sudo version
1.8.20p1 and earlier that results in information disclosure and
arbitrary command execution. (CVE-2017-1000368)

See also :

https://kc.mcafee.com/corporate/index?page=content&id=SB10205

Solution :

Upgrade to McAfee
Web Gateway 7.6.2.15 / 7.7.2.3 or later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

Family: Misc.

Nessus Plugin ID: 102496 ()

Bugtraq ID:

CVE ID: CVE-2012-6706
CVE-2017-1000364
CVE-2017-1000366
CVE-2017-1000368

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now