Lucene search

K
nessusThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MCAFEE_APP_CTL_6_2_0_505.NASL
HistoryJan 14, 2016 - 12:00 a.m.

McAfee Application Control swin.sys Memory Corruption (SB10145)

2016-01-1400:00:00
This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
267

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H

5.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:P/I:P/A:C

0.001 Low

EPSS

Percentile

43.4%

The version of McAfee Application Control is 6.1.0 prior to build 706, 6.1.1 prior to build 404, 6.1.2 prior to build 449, 6.1.3 prior to build 441, or 6.2.0 prior to build 505. It is, therefore, affected by a kernel memory corruption issue in the swin.sys driver when handling a 786 syscall, which causes a zero to be written to an arbitrary location in kernel memory. A local attacker can exploit this, via a crafted web page or file, to cause a denial of service, gain elevated privileges, or possibly execute arbitrary code.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(87922);
  script_version("1.8");
  script_cvs_date("Date: 2019/11/22");

  script_cve_id("CVE-2016-1715");
  script_xref(name:"MCAFEE-SB", value:"SB10145");
  script_xref(name:"IAVB", value:"2016-B-0011");
  script_xref(name:"ZDI", value:"ZDI-16-007");

  script_name(english:"McAfee Application Control swin.sys Memory Corruption (SB10145)");
  script_summary(english:"Checks the version of McAfee Application Control.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a security application installed that is affected
by denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of McAfee Application Control is 6.1.0 prior to build 706,
6.1.1 prior to build 404, 6.1.2 prior to build 449, 6.1.3 prior to
build 441, or 6.2.0 prior to build 505. It is, therefore, affected by
a kernel memory corruption issue in the swin.sys driver when handling
a 786 syscall, which causes a zero to be written to an arbitrary
location in kernel memory. A local attacker can exploit this, via a
crafted web page or file, to cause a denial of service, gain elevated
privileges, or possibly execute arbitrary code.");
  script_set_attribute(attribute:"see_also", value:"https://kc.mcafee.com/corporate/index?page=content&id=SB10145");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-16-007/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to McAfee Application Control version 6.1.0.706 / 6.1.1.404 /
6.1.2.449 / 6.1.3.441 / 6.2.0.505 or later.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-1715");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/01/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/12/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/01/14");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:application_control");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mcafee_app_ctl_installed.nbin");
  script_require_keys("installed_sw/McAfee Application Control");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = 'McAfee Application Control';
get_install_count(app_name:app, exit_if_zero:TRUE);

if (get_kb_item("SMB/ARCH") != "x86")
  audit(AUDIT_ARCH_NOT, "x86");

install = get_single_install(
  app_name : app,
  exit_if_unknown_ver : TRUE
);

path = install['path'];
version = install['version'];

fix = NULL;

if (version =~ "^6\.1\.0" && (ver_compare(ver:version, fix:"6.1.0.706") < 0))
  fix = "6.1.0.706";
else if (version =~ "^6\.1\.1" && (ver_compare(ver:version, fix:"6.1.1.404") < 0))
  fix = "6.1.1.404";
else if (version =~ "^6\.1\.2" && (ver_compare(ver:version, fix:"6.1.2.449") < 0))
  fix = "6.1.2.449";
else if (version =~ "^6\.1\.3" && (ver_compare(ver:version, fix:"6.1.3.441") < 0))
  fix = "6.1.3.441";
else if (version =~ "^6\.2\.0" && (ver_compare(ver:version, fix:"6.2.0.505") < 0))
  fix = "6.2.0.505";

port = get_kb_item("SMB/transport");
if (! port)
  port = 445;

if (fix)
{
    if (report_verbosity > 0)
  {
    report =
      '\n  Installed path    : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : ' + fix + '\n';

    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
audit(AUDIT_INST_VER_NOT_VULN, app, version);
VendorProductVersionCPE
mcafeeapplication_controlcpe:/a:mcafee:application_control

6.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H

5.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:P/I:P/A:C

0.001 Low

EPSS

Percentile

43.4%

Related for MCAFEE_APP_CTL_6_2_0_505.NASL