ePolicy Orchestrator Symlink Arbitrary Privileged File Access

Medium Nessus Plugin ID 19552


The remote web server is prone to an information disclosure vulnerability.


The remote host is running ePolicy Orchestrator / ProtectionPilot, a system security management solution from McAfee.

According to its banner, the Common Management Agent (CMA) associated with ePolicy Orchestrator / ProtectionPilot on the remote host can be used by local users to view files residing on the same partition as the affected application with LocalSystem level privileges by creating symbolic links in the agent's web root directory. This may enable them to read files to which they would not otherwise have access.


Apply CMA 3.5 Patch 4 as described in the vendor's advisory.

See Also



Plugin Details

Severity: Medium

ID: 19552

File Name: epolicy_orchestrator_local_info_disclosure.nasl

Version: $Revision: 1.16 $

Type: remote

Family: Web Servers

Published: 2005/09/01

Modified: 2011/06/01

Dependencies: 10107

Risk Information

Risk Factor: Medium


Base Score: 4.9

Temporal Score: 4.7

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:W/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:epolicy_orchestrator

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2005/08/11

Reference Information

CVE: CVE-2005-2554

BID: 14549

OSVDB: 18735