This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote host running McAfee Web Gateway is affected by multiple
code execution vulnerabilities.
The remote host is running a version of McAfee Web Gateway (MWG) that
is affected by multiple security vulnerabilities :
- A memory corruption flaw exists in unrar before 5.5.5, as used in
Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other
products that allows remote attackers to execute arbitrary code.
- A memory corruption flaw exists in Linux Kernel versions 4.11.5
and earlier that allows remote attacks to execute arbitrary code
with elevated privileges.(CVE-2017-1000364)
- A memory corruption flaw exists in the handling of LD_LIBRARY_PATH
that allows a remote attacker to manipulate the heap/stack that
may lead to arbitrary code execution. This issue only affects GNU
glibc 2.25 and prior. (CVE-2017-1000366)
- An input validation flaw exists in Todd Miller's sudo version
1.8.20p1 and earlier that results in information disclosure and
arbitrary command execution. (CVE-2017-1000368)
See also :
Upgrade to McAfee
Web Gateway 188.8.131.52 / 184.108.40.206 or later.
Risk factor :
High / CVSS Base Score : 7.6