ePolicy Orchestrator HTTP /spipe/pkg/ Source Header Remote Overflow

Critical Nessus Plugin ID 22494


Arbitrary code can be executed on the remote host due to a flaw in the web service.


The remote host is running McAfee ePolicy Orchestrator web service.

The remote version of this software contains a stack overflow vulnerability.

An unauthenticated attacker can exploit this flaw by sending a specialy crafted packet to the remote host. A successful exploitation of this vulnerability would result in remote code execution with SYSTEM privileges.


Install ePO 3.5.0 Patch 6.

See Also


Plugin Details

Severity: Critical

ID: 22494

File Name: epolicy_orchestrator_overflow.nasl

Version: $Revision: 1.17 $

Type: local

Family: Web Servers

Published: 2006/10/03

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:epolicy_orchestrator

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/10/02

Exploitable With

Core Impact

Metasploit (McAfee ePolicy Orchestrator / ProtectionPilot Overflow)

Reference Information

CVE: CVE-2006-5156

BID: 20288

OSVDB: 29421