ePolicy Orchestrator HTTP /spipe/pkg/ Source Header Remote Overflow

critical Nessus Plugin ID 22494

Synopsis

Arbitrary code can be executed on the remote host due to a flaw in the web service.

Description

The remote host is running McAfee ePolicy Orchestrator web service.

The remote version of this software contains a stack overflow vulnerability.

An unauthenticated attacker can exploit this flaw by sending a specialy crafted packet to the remote host. A successful exploitation of this vulnerability would result in remote code execution with SYSTEM privileges.

Solution

Install ePO 3.5.0 Patch 6.

See Also

http://www.nessus.org/u?74be4c95

Plugin Details

Severity: Critical

ID: 22494

File Name: epolicy_orchestrator_overflow.nasl

Version: 1.18

Type: local

Family: Web Servers

Published: 10/3/2006

Updated: 7/10/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:mcafee:epolicy_orchestrator

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/2/2006

Exploitable With

Core Impact

Metasploit (McAfee ePolicy Orchestrator / ProtectionPilot Overflow)

Reference Information

CVE: CVE-2006-5156

BID: 20288