CVE-2008-1357 |
|
发布时间 :2008-03-17 13:44:00 | ||
修订时间 :2011-03-07 22:06:57 | ||||
NMCO |
[原文]Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082. NOTE: this issue only exists when the debug level is 8.
[CNNVD]McAfee Framework ‘applib.dll库’ 远程格式串处理漏洞(CNNVD-200803-250)
McAfee Framework是McAfee ePolicy Orchestrator中所实现的用于创建各种McAfee产品服务的框架。
McAfee Framework所安装的applib.dll库中的logDetail函数缺少必要的格式参数便调用了vsnwprintf,远程攻击者可能利用此漏洞控制服务器。
在McAfee ePolicy Orchestrator中可通过发送单个带有畸形sender、package或computer字段的UDP报文来触发这个漏洞。输出日志文件Agent_HOSTNAME.log位于Db文件夹中。
–
CVSS (基础分值)
CVSS分值: | 5.4 | [中等(MEDIUM)] |
机密性影响: | NONE | [对系统的机密性无影响] |
完整性影响: | NONE | [不会对系统完整性产生影响] |
可用性影响: | COMPLETE | [可能导致系统完全宕机] |
攻击复杂度: | HIGH | [漏洞利用存在特定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-134 | [] |
–
CPE (受影响的平台与产品)
cpe:/a:mcafee:mcafee_framework:3.6.569 | |
cpe:/a:mcafee:cma:3.6.453 | |
cpe:/a:mcafee:agent:4.0 | |
cpe:/a:mcafee:cma:3.6.574 | |
cpe:/a:mcafee:cma:3.6.546 | |
cpe:/a:mcafee:cma:3.0.6.453 | |
cpe:/a:mcafee:cma:3.6.438 | |
cpe:/a:mcafee:epolicy_orchestrator:4.0 | McAfee ePolicy Orchestrator 4.0 |
cpe:/a:mcafee:cma:3.5.5.438 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
https://knowledge.mcafee.com/article/234/615103_f.sal_public.html (UNKNOWN) CONFIRM https://knowledge.mcafee.com/article/234/615103_f.sal_public.html |
http://xforce.iss.net/xforce/xfdb/41178 (UNKNOWN) XF mcafee-framework-format-string(41178) |
http://www.vupen.com/english/advisories/2008/0866/references (UNKNOWN) VUPEN ADV-2008-0866 |
http://www.securitytracker.com/id?1019609 (UNKNOWN) SECTRACK 1019609 |
http://www.securityfocus.com/bid/28228 (UNKNOWN) BID 28228 |
http://www.securityfocus.com/archive/1/archive/1/489476/100/0/threaded (UNKNOWN) BUGTRAQ 20080312 Format string in McAfee Framework 3.6.0.569 (ePolicy Orchestrator 4.0) |
http://secunia.com/advisories/29337 (VENDOR_ADVISORY) SECUNIA 29337 |
http://aluigi.altervista.org/adv/meccaffi-adv.txt (UNKNOWN) MISC http://aluigi.altervista.org/adv/meccaffi-adv.txt |
http://securityreason.com/securityalert/3748 (UNKNOWN) SREASON 3748 |
–
漏洞信息
McAfee Framework ‘applib.dll库’ 远程格式串处理漏洞 | |
中危 | 格式化字符串 |
2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
McAfee Framework是McAfee ePolicy Orchestrator中所实现的用于创建各种McAfee产品服务的框架。 McAfee Framework所安装的applib.dll库中的logDetail函数缺少必要的格式参数便调用了vsnwprintf,远程攻击者可能利用此漏洞控制服务器。 在McAfee ePolicy Orchestrator中可通过发送单个带有畸形sender、package或computer字段的UDP报文来触发这个漏洞。输出日志文件Agent_HOSTNAME.log位于Db文件夹中。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.mcafee.com/ |
–
漏洞信息
42853 |
|
McAfee ePolicy Orchestrator Framework Service Crafted UDP Packet Handling Format String | |
Remote / Network Access, Local / Remote, Context Dependent |
Input Manipulation |
Loss of Integrity | |
Exploit Public | Vendor Verified |
–
漏洞描述
–
时间线
2008-03-12 |
Unknow |
2008-03-12 | Unknow |