ePolicy Orchestrator HTTP /spipe/pkg/ Source Header Remote Overflow

critical Nessus Plugin ID 22494


Arbitrary code can be executed on the remote host due to a flaw in the web service.


The remote host is running McAfee ePolicy Orchestrator web service.

The remote version of this software contains a stack overflow vulnerability.

An unauthenticated attacker can exploit this flaw by sending a specialy crafted packet to the remote host. A successful exploitation of this vulnerability would result in remote code execution with SYSTEM privileges.


Install ePO 3.5.0 Patch 6.

See Also


Plugin Details

Severity: Critical

ID: 22494

File Name: epolicy_orchestrator_overflow.nasl

Version: 1.18

Type: local

Family: Web Servers

Published: 10/3/2006

Updated: 7/10/2018

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:epolicy_orchestrator

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 10/2/2006

Exploitable With

Core Impact

Metasploit (McAfee ePolicy Orchestrator / ProtectionPilot Overflow)

Reference Information

CVE: CVE-2006-5156

BID: 20288