ID CVE-2016-8009 Type cve Reporter cve@mitre.org Modified 2017-03-27T15:26:00
Description
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
{"ptsecurity": [{"lastseen": "2020-06-11T19:06:27", "bulletinFamily": "info", "cvelist": ["CVE-2016-8009"], "edition": 4, "description": "# PT-2016-36: Privilege Escalation in McAfee Application Control\n\n**Vulnerable software**\n\nMcAfee Application Control \nVersion: 7.0.0 and 6.x \n\nLinks: \n[ http://www.mcafee.com/](<http://www.mcafee.com/us/products/application-control.aspx>)\n\n**Severity level**\n\nSeverity level: High \nImpact: Privilege Escalation, Denial of Service, Arbitrary Code Execution \nAccess Vector: Local \n\n\nCVSS v3: \nBase Score: 7.5 \nVector: (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H) \n\nCVE: CVE-2016-8009 \n\n**Software description**\n\nMcAfee Application Control provides fast, flexible and scalable protection against zero-day and advanced persistent threats \n\n**Vulnerability description**\n\nThe specialists of the Positive Research center have detected a Privilege Escalation vulnerability in McAfee Application Control. \n\nVulnerability in McAfee Application Control allows attackers elevate privileges, cause a denial of service, or potentially execute arbitrary code via unauthorized use of IOCTL. \n\n**How to fix**\n\nUpdate your software up to the latest version \n\n**Advisory status**\n\n02.09.2016 - Vendor gets vulnerability details \n01.12.2016 - Vendor releases fixed version and details \n16.12.2016 - Public disclosure \n\n**Credits**\n\nThe vulnerability was detected by Maxim Kozhevnikov, Positive Research Center (Positive Technologies Company) \n\n**References**\n\n[ http://en.securitylab.ru/lab/PT-2016-36](<http://en.securitylab.ru/lab/PT-2016-36>) \n[ https://kc.mcafee.com/corporate/index?page=content&id=SB10175](<https://kc.mcafee.com/corporate/index?page=content&id=SB10175>)\n\nReports on the vulnerabilities previously discovered by Positive Research: \n\n[http://www.ptsecurity.com](<http://www.ptsecurity.com/research/threatscape/>) \n<http://en.securitylab.ru/lab/>\n\n**About Positive Technologies**\n\nPositive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit [www.ptsecurity.com](<http://www.ptsecurity.com/>)\n\n*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. _Based on year-over-year revenue growth in 2012_ for vendors with revenues of $20M+\n", "modified": "1970-01-01T00:00:00", "published": "2016-12-16T00:00:00", "id": "PT-2016-36", "href": "https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2016-36/", "title": "PT-2016-36: Privilege Escalation in McAfee Application Control", "type": "ptsecurity", "cvss": {}}], "nessus": [{"lastseen": "2021-01-01T03:45:57", "description": "The version of McAfee Application Control (MAC) installed on the\nremote Windows host is 6.x prior to 6.2.0 build 567 or 7.0.x prior to\n7.0.1 build 275. It is, therefore, affected by a local privilege\nescalation vulnerability due to the unauthorized use of IOCTL. A local\nattacker can exploit this to gain elevated privileges.", "edition": 26, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-12-16T00:00:00", "title": "McAfee Application Control 6.x < 6.2.0.567 / 7.0.x < 7.0.1.275 Unauthorized IOCTL Use Local Privilege Escalation (SB10175)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-8009"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:mcafee:application_control"], "id": "MCAFEE_APP_CTL_7_0_1_275.NASL", "href": "https://www.tenable.com/plugins/nessus/95924", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(95924);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\"CVE-2016-8009\");\n script_xref(name:\"MCAFEE-SB\", value:\"SB10175\");\n\n script_name(english:\"McAfee Application Control 6.x < 6.2.0.567 / 7.0.x < 7.0.1.275 Unauthorized IOCTL Use Local Privilege Escalation (SB10175)\");\n script_summary(english:\"Checks the version of McAfee Application Control.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a security application installed that is affected\nby a local privilege escalation vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of McAfee Application Control (MAC) installed on the\nremote Windows host is 6.x prior to 6.2.0 build 567 or 7.0.x prior to\n7.0.1 build 275. It is, therefore, affected by a local privilege\nescalation vulnerability due to the unauthorized use of IOCTL. A local\nattacker can exploit this to gain elevated privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://kc.mcafee.com/corporate/index?page=content&id=SB10175\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to McAfee Application Control version 6.2.0.567 / 7.0.1.275 or\nlater as referenced in the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-8009\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/11/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:mcafee:application_control\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mcafee_app_ctl_installed.nbin\");\n script_require_keys(\"installed_sw/McAfee Application Control\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"install_func.inc\");\n\napp = 'McAfee Application Control';\nget_install_count(app_name:app, exit_if_zero:TRUE);\n\ninstall = get_single_install(\n app_name : app,\n exit_if_unknown_ver : TRUE\n);\n\npath = install['path'];\nversion = install['version'];\n\nfix = NULL;\n\nif (version =~ \"^6\\.[012]\\.\" && (ver_compare(ver:version, fix:\"6.2.0.567\", strict:FALSE) < 0))\n fix = \"6.2.0.567\";\nelse if (version =~ \"^7\\.0\\.\" && (ver_compare(ver:version, fix:\"7.0.1.275\", strict:FALSE) < 0))\n fix = \"7.0.1.275\";\n\nport = get_kb_item(\"SMB/transport\");\nif (! port)\n port = 445;\n\nif (fix)\n{\n report =\n '\\n Installed path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix + '\\n';\n\n security_report_v4(severity:SECURITY_WARNING, port:port, extra:report);\n}\nelse audit(AUDIT_INST_VER_NOT_VULN, app, version);\n", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}]}