McAfee LinuxShield <= 1.5.1 nailsd Daemon Remote Privilege Escalation

medium Nessus Plugin ID 70195
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

An application on the remote host is affected by a privilege escalation vulnerability.

Description

The version of McAfee LinuxShield installed on the remote host is 1.5.1 or earlier. As such, it potentially is affected by a privilege escalation vulnerability because it does not properly authenticate clients. An attacker able to log into the remote host can leverage this vulnerability to authenticate to the application's 'nailsd' daemon and do configuration changes as well as execute tasks subject to the privileges with which the 'nailsd' daemon operates.

Solution

Upgrade to LinuxShield 1.5.1 if necessary and install hotfix HF550192

See Also

http://sotiriu.de/adv/NSOADV-2010-004.txt

https://seclists.org/bugtraq/2010/Mar/26

Plugin Details

Severity: Medium

ID: 70195

File Name: mcafee_linuxshield_sb10007.nasl

Version: 1.10

Type: local

Published: 9/28/2013

Updated: 11/15/2018

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:linuxshield:1.5.1

Required KB Items: Host/local_checks_enabled

Exploit Ease: No known exploits are available

Patch Publication Date: 2/25/2010

Vulnerability Publication Date: 3/2/2010

Reference Information

CVE: CVE-2009-5116

BID: 38489

EDB-ID: 14818