McAfee ePO DLPe Extension < 9.3.416.4 Multiple Vulnerabilities (SB10111)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by multiple vulnerabilities.

Description :

The remote McAfee ePO server has a version of the McAfee Data Loss
Protection Endpoint (DLPe) installed that is affected by multiple
vulnerabilities :

- The ePO extension is affected by an unspecified denial
of service vulnerability via a database lock or license
corruption, which can be exploited by an authenticated,
remote attacker. (CVE-2015-2757)

- An information disclosure vulnerability exists in the
ePO extension that allows an authenticated, remote
attacker to obtain sensitive information or modify the
database by using a specially crafted URL.
(CVE-2015-2758)

- Multiple cross-site request forgery vulnerabilities
exist in the ePO extension that allow a remote attacker
to hijack the authentication of users, resulting in
disclosure of sensitive information or modification of
the database. (CVE-2015-2759)

- An unspecified cross-site scripting vulnerability exists
in the ePO extension, which an authenticated, remote
attacker can exploit to inject arbitrary script or HTML.
(CVE-2015-2760)

See also :

https://kc.mcafee.com/corporate/index?page=content&id=SB10111
http://www.mcafee.com/us/products/dlp-endpoint.aspx

Solution :

Upgrade to DLPe 9.3 Patch 4 Hotfix 16 (9.3.416.4) or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 82620 ()

Bugtraq ID: 73193
73397
73399
73403

CVE ID: CVE-2015-2757
CVE-2015-2758
CVE-2015-2759
CVE-2015-2760

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now