SynopsisThe remote host running McAfee Web Gateway is affected by multiple code execution vulnerabilities.
DescriptionThe remote host is running a version of McAfee Web Gateway (MWG) that is affected by multiple security vulnerabilities :
- A memory corruption flaw exists in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products that allows remote attackers to execute arbitrary code.
- A memory corruption flaw exists in Linux Kernel versions 4.11.5 and earlier that allows remote attacks to execute arbitrary code with elevated privileges.(CVE-2017-1000364)
- A memory corruption flaw exists in the handling of LD_LIBRARY_PATH that allows a remote attacker to manipulate the heap/stack that may lead to arbitrary code execution. This issue only affects GNU glibc 2.25 and prior. (CVE-2017-1000366)
- An input validation flaw exists in Todd Miller's sudo version 1.8.20p1 and earlier that results in information disclosure and arbitrary command execution. (CVE-2017-1000368)
SolutionUpgrade to McAfee Web Gateway 126.96.36.199 / 188.8.131.52 or later.