McAfee Web Gateway 7.6.x < 126.96.36.199 / 7.7.x < 188.8.131.52 Multiple Vulnerabilities (SB10205)
High Nessus Plugin ID 102496
SynopsisThe remote host running McAfee Web Gateway is affected by multiple code execution vulnerabilities.
DescriptionThe remote host is running a version of McAfee Web Gateway (MWG) that is affected by multiple security vulnerabilities :
- A memory corruption flaw exists in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products that allows remote attackers to execute arbitrary code.
- A memory corruption flaw exists in Linux Kernel versions 4.11.5 and earlier that allows remote attacks to execute arbitrary code with elevated privileges.(CVE-2017-1000364)
- A memory corruption flaw exists in the handling of LD_LIBRARY_PATH that allows a remote attacker to manipulate the heap/stack that may lead to arbitrary code execution. This issue only affects GNU glibc 2.25 and prior. (CVE-2017-1000366)
- An input validation flaw exists in Todd Miller's sudo version 1.8.20p1 and earlier that results in information disclosure and arbitrary command execution. (CVE-2017-1000368)
SolutionUpgrade to McAfee Web Gateway 184.108.40.206 / 220.127.116.11 or later.