{ "CVE_data_meta": { "ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2018-6703", "STATE": "PUBLIC", "TITLE": "McAfee Agent Incorrect memory and handle management vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Agent (MA)", "version": { "version_data": [ { "affected": ">=", "platform": "x86", "version_name": "5.0.0", "version_value": "5.0.0" }, { "affected": "<=", "platform": "x86", "version_name": "5.0.6", "version_value": "5.0.6" }, { "version_name": "5.5.0", "version_value": "5.5.0" }, { "version_name": "5.5.1", "version_value": "5.5.1" } ] } } ] }, "vendor_name": "McAfee" } ] } }, "credit": [ { "lang": "eng", "value": "McAfee credits Frank Cozijnsen of the KPN RED-team for reporting this flaw." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free in McAfee Common service in McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted TCP packet." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use After Free (CWE-416)" } ] } ] }, "references": { "reference_data": [ { "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10258", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10258" } ] }, "source": { "advisory": "SB10258", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "eng", "value": "McAfee highly recommends that all customers upgrade to McAfee Agent 5.6.0.\n\nIf you cannot upgrade, consider the below configuration change as a temporary workaround.\nDisable the remote logging feature via policy:\nGo to the assigned policy type General for the product McAfee Agent.\nGo to Logging tab.\nDisable Enable remote access to log." } ] }