McAfee VirusScan Enterprise 8.5 / 8.7 hcp:// Security Bypass (SB10012)

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.

Synopsis :

The remote host has an antivirus application that is affected by a
security bypass vulnerability.

Description :

The remote Windows host has McAfee VirusScan Enterprise version 8.5 or
8.7. It is, therefore, affected by a security bypass vulnerability due
to a failure to properly interact with the processing of 'hcp://' URLs.
This can lead to malware execution prior to detection.

See also :

Solution :

Apply the patch from Microsoft Bulletin MS10-042 or enable VirusScan
Enterprise access protection rule 'Disable HCP URLs in Internet
Explorer' (requires Buffer Overflow and Access Protection DAT Version
516 or greater).

Risk factor :

Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 6.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 72216 ()

Bugtraq ID: 44184

CVE ID: CVE-2010-3496

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now