Summary
Detail | |||
---|---|---|---|
Vendor | Mcafee | First view | 1999-12-22 |
Product | Virusscan | Last view | 2007-05-09 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
10 | 2007-05-09 | CVE-2007-2584 | Buffer overflow in the IsOldAppInstalled function in the McSubMgr.McSubMgr Subscription Manager ActiveX control (MCSUBMGR.DLL) in McAfee SecurityCenter before 6.0.25 and 7.x before 7.2.147 allows remote attackers to execute arbitrary code via a crafted argument. |
4.6 | 2006-12-14 | CVE-2006-6474 | Untrusted search path vulnerability in McAfee VirusScan for Linux 4510e and earlier includes the current working directory in the DT_RPATH environment variable, which allows local users to load arbitrary ELF DSO libraries and execute arbitrary code by installing malicious libraries in that directory. |
5 | 2006-10-20 | CVE-2006-5417 | McAfee Network Agent (mcnasvc.exe) 1.0.178.0, as used by multiple McAfee products possibly including Internet Security Suite, Personal Firewall Plus, and VirusScan, allows remote attackers to cause a denial of service (agent crash) via a long packet, possibly because of an invalid string position field value. NOTE: some of these details are obtained from third party information. |
6.8 | 2006-08-01 | CVE-2006-3961 | Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf. |
2.1 | 2006-07-13 | CVE-2006-3575 | Unknown vulnerability in the Buffer Overflow Protection in McAfee VirusScan Enterprise 8.0.0 allows local users to cause a denial of service (unstable operation) via a long string in the (1) "Process name", (2) "Module name", or (3) "API name" fields. |
7.2 | 2004-09-14 | CVE-2004-0831 | McAfee VirusScan 4.5.1 does not drop SYSTEM privileges before allowing users to browse for files via the "System Scan" properties of the System Tray applet, which could allow local users to gain privileges. |
6.9 | 2002-12-31 | CVE-2002-2282 | McAfee VirusScan 4.5.1, when the WebScanX.exe module is enabled, searches for particular DLLs from the user's home directory, even when browsing the local hard drive, which allows local users to run arbitrary code via malicious versions of those DLLs. |
4.6 | 2001-01-09 | CVE-2000-1128 | The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. |
2.1 | 2000-06-08 | CVE-2000-0502 | Mcafee VirusScan 4.03 does not properly restrict access to the alert text file before it is sent to the Central Alert Server, which allows local users to modify alerts in an arbitrary fashion. |
7.2 | 1999-12-22 | CVE-2000-0119 | The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-38 | Leveraging/Manipulating Configuration File Search Paths |
SAINT Exploits
Description | Link |
---|---|
McAfee Subscription Manager ActiveX buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60180 | McAfee VirusScan WebScanX.exe Module DLL Search Path Subversion Local Privile... |
35874 | McAfee SecurityCenter McSubMgr.McSubMgr Subscription Manager ActiveX (MCSUBMG... |
31295 | McAfee VirusScan for Linux DT_RPATH Variable Path Subversion Privilege Escala... |
30091 | McAfee VirusScan Enterprise Multiple Field Local DoS |
29715 | McAfee Network Agent (McNASvc.exe) Invalid String Position Remote DoS |
27698 | McAfee Multiple Products SecurityCenter Subscription Manager ActiveX (McSubMg... |
9949 | McAfee VirusScan System Scan Privilege Escalation |
6289 | McAfee VirusScan Improper ImagePath Quoting |
6287 | McAfee VirusScan Unauthorized User Alert File Modification |
6269 | Multiple Virus Scanner Recycle Bin Scan Bypass |
OpenVAS Exploits
id | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200612-15 (vlnx) File : nvt/glsa_200612_15.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | McSubMgr ActiveX CLSID unicode access RuleID : 7865 - Type : WEB-ACTIVEX - Revision : 6 |
2014-01-10 | McSubMgr ActiveX CLSID access RuleID : 7864 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Mcafee Security Center McSubMgr.IsOldAppInstalled ActiveX function call access RuleID : 7863 - Type : BROWSER-PLUGINS - Revision : 13 |
2014-01-10 | Mcafee Security Center McSubMgr.IsAppExpired ActiveX function call access RuleID : 7862 - Type : BROWSER-PLUGINS - Revision : 13 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2006-12-14 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200612-15.nasl - Type: ACT_GATHER_INFO |