FireEye Operating System Multiple Vulnerabilities

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The remote host is running a version of FireEye Operating System
(FEOS) that is missing a vendor-supplied security patch. It is,
therefore, affected by multiple vulnerabilities :

- An flaw exists in the Virtual Execution Engine (VXE)
during the handling of file names that were previously
flagged for the whitelist. A remote attacker can exploit
this, via subsequent malicious files with the same file
name, to bypass the analysis engine. (VulnDB 134606)

- A flaw exists when handling a specially crafted URL that
allows an authenticated, remote attacker to render
plaintext in the web user interface post-authentication,
resulting in the disclosure of sensitive information.
(VulnDB 134607)

NOTE: FX version 7.5.0 is affected by the Analysis Engine Evasion
vulnerability, but NOT the URL Encoded Bypass vulnerability.

See also :

http://www.nessus.org/u?ab6d5aa8

Solution :

Apply the relevant patch referenced in the vendor advisory.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:L/Au:S/C:N/I:C/A:N)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 89724 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now