mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
113 lines
3.8 KiB
JSON
113 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "psirt@mcafee.com",
|
|
"ID" : "CVE-2018-6703",
|
|
"STATE" : "PUBLIC",
|
|
"TITLE" : "McAfee Agent Incorrect memory and handle management vulnerability"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "McAfee Agent (MA)",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"affected" : ">=",
|
|
"platform" : "x86",
|
|
"version_name" : "5.0.0",
|
|
"version_value" : "5.0.0"
|
|
},
|
|
{
|
|
"affected" : "<=",
|
|
"platform" : "x86",
|
|
"version_name" : "5.0.6",
|
|
"version_value" : "5.0.6"
|
|
},
|
|
{
|
|
"version_name" : "5.5.0",
|
|
"version_value" : "5.5.0"
|
|
},
|
|
{
|
|
"version_name" : "5.5.1",
|
|
"version_value" : "5.5.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "McAfee"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "McAfee credits Frank Cozijnsen of the KPN RED-team for reporting this flaw."
|
|
}
|
|
],
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use After Free in McAfee Common service in McAfee Agent (MA) 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted TCP packet."
|
|
}
|
|
]
|
|
},
|
|
"impact" : {
|
|
"cvss" : {
|
|
"attackComplexity" : "LOW",
|
|
"attackVector" : "ADJACENT_NETWORK",
|
|
"availabilityImpact" : "LOW",
|
|
"baseScore" : 4.3,
|
|
"baseSeverity" : "MEDIUM",
|
|
"confidentialityImpact" : "NONE",
|
|
"integrityImpact" : "NONE",
|
|
"privilegesRequired" : "NONE",
|
|
"scope" : "UNCHANGED",
|
|
"userInteraction" : "NONE",
|
|
"vectorString" : "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
"version" : "3.0"
|
|
}
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Use After Free (CWE-416)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10258",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10258"
|
|
}
|
|
]
|
|
},
|
|
"source" : {
|
|
"advisory" : "SB10258",
|
|
"discovery" : "EXTERNAL"
|
|
},
|
|
"work_around" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "McAfee highly recommends that all customers upgrade to McAfee Agent 5.6.0.\n\nIf you cannot upgrade, consider the below configuration change as a temporary workaround.\nDisable the remote logging feature via policy:\nGo to the assigned policy type General for the product McAfee Agent.\nGo to Logging tab.\nDisable Enable remote access to log."
|
|
}
|
|
]
|
|
}
|