cve/2018/CVE-2018-6674.md

21 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-6674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6674)
![](https://img.shields.io/static/v1?label=Product&message=%20VirusScan%20Enterprise%20(VSE)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8.8%3C%208.8%20Patch%2013%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Data%20Leakage%20via%20Privilege%20Escalation%20(CWE-269)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Permissions%2C%20Privileges%2C%20and%20Access%20Control%20(CWE-264)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Privilege%20Escalation%20(CWE-274)&color=brighgreen)
### Description
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 13 allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges).
### POC
#### Reference
- https://kc.mcafee.com/corporate/index?page=content&id=SB10237
2024-06-09 00:33:16 +00:00
- https://kc.mcafee.com/corporate/index?page=content&id=SB10237
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.