Lucene search

K
nessusThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.MCAFEE_APP_CTL_7_0_1_275.NASL
HistoryDec 16, 2016 - 12:00 a.m.

McAfee Application Control 6.x < 6.2.0.567 / 7.0.x < 7.0.1.275 Unauthorized IOCTL Use Local Privilege Escalation (SB10175)

2016-12-1600:00:00
This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
36

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.7%

The version of McAfee Application Control (MAC) installed on the remote Windows host is 6.x prior to 6.2.0 build 567 or 7.0.x prior to 7.0.1 build 275. It is, therefore, affected by a local privilege escalation vulnerability due to the unauthorized use of IOCTL. A local attacker can exploit this to gain elevated privileges.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(95924);
  script_version("1.4");
  script_cvs_date("Date: 2019/11/13");

  script_cve_id("CVE-2016-8009");
  script_xref(name:"MCAFEE-SB", value:"SB10175");

  script_name(english:"McAfee Application Control 6.x < 6.2.0.567 / 7.0.x < 7.0.1.275 Unauthorized IOCTL Use Local Privilege Escalation (SB10175)");
  script_summary(english:"Checks the version of McAfee Application Control.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a security application installed that is affected
by a local privilege escalation vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of McAfee Application Control (MAC) installed on the
remote Windows host is 6.x prior to 6.2.0 build 567 or 7.0.x prior to
7.0.1 build 275. It is, therefore, affected by a local privilege
escalation vulnerability due to the unauthorized use of IOCTL. A local
attacker can exploit this to gain elevated privileges.");
  script_set_attribute(attribute:"see_also", value:"https://kc.mcafee.com/corporate/index?page=content&id=SB10175");
  script_set_attribute(attribute:"solution", value:
"Upgrade to McAfee Application Control version 6.2.0.567 / 7.0.1.275 or
later as referenced in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-8009");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/11/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/10/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/16");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:application_control");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mcafee_app_ctl_installed.nbin");
  script_require_keys("installed_sw/McAfee Application Control");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = 'McAfee Application Control';
get_install_count(app_name:app, exit_if_zero:TRUE);

install = get_single_install(
  app_name : app,
  exit_if_unknown_ver : TRUE
);

path = install['path'];
version = install['version'];

fix = NULL;

if (version =~ "^6\.[012]\." && (ver_compare(ver:version, fix:"6.2.0.567", strict:FALSE) < 0))
  fix = "6.2.0.567";
else if (version =~ "^7\.0\." && (ver_compare(ver:version, fix:"7.0.1.275", strict:FALSE) < 0))
  fix = "7.0.1.275";

port = get_kb_item("SMB/transport");
if (! port)
  port = 445;

if (fix)
{
  report =
    '\n  Installed path    : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix + '\n';

  security_report_v4(severity:SECURITY_WARNING, port:port, extra:report);
}
else audit(AUDIT_INST_VER_NOT_VULN, app, version);
VendorProductVersionCPE
mcafeeapplication_controlcpe:/a:mcafee:application_control

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.7%

Related for MCAFEE_APP_CTL_7_0_1_275.NASL