McAfee Application Control swin.sys Memory Corruption (SB10145)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host has a security application installed that is affected
by denial of service vulnerability.

Description :

The version of McAfee Application Control is 6.1.0 prior to build 706,
6.1.1 prior to build 404, 6.1.2 prior to build 449, 6.1.3 prior to
build 441, or 6.2.0 prior to build 505. It is, therefore, affected by
a kernel memory corruption issue in the swin.sys driver when handling
a 786 syscall, which causes a zero to be written to an arbitrary
location in kernel memory. A local attacker can exploit this, via a
crafted web page or file, to cause a denial of service, gain elevated
privileges, or possibly execute arbitrary code.

See also :

https://kc.mcafee.com/corporate/index?page=content&id=SB10145
http://www.zerodayinitiative.com/advisories/ZDI-16-007

Solution :

Upgrade to McAfee Application Control version 6.1.0.706 / 6.1.1.404 /
6.1.2.449 / 6.1.3.441 / 6.2.0.505 or later.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 5.1
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 87922 ()

Bugtraq ID:

CVE ID: CVE-2016-1715

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now