Vulnerabilities > CVE-2005-2554 - Local Information Disclosure vulnerability in Network Associates Epolicy Orchestrator Agent 3.5.0(Patch3)
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
The web server for Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3) uses insecure permissions for the "Common Framework\Db" folder, which allows local users to read arbitrary files by creating a subfolder in the EPO agent web root directory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Web Servers |
NASL id | EPOLICY_ORCHESTRATOR_LOCAL_INFO_DISCLOSURE.NASL |
description | The remote host is running ePolicy Orchestrator / ProtectionPilot, a system security management solution from McAfee. According to its banner, the Common Management Agent (CMA) associated with ePolicy Orchestrator / ProtectionPilot on the remote host can be used by local users to view files residing on the same partition as the affected application with LocalSystem level privileges by creating symbolic links in the agent |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19552 |
published | 2005-09-01 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19552 |
title | ePolicy Orchestrator Symlink Arbitrary Privileged File Access |
code |
|
References
- http://knowledgemap.nai.com/KanisaSupportSite/search.do?cmd=displayKC&docType=kc&externalId=KBkb42216xml
- http://lists.virus.org/full-disclosure-0508/msg00376.html
- http://reedarvin.thearvins.com/20050811-01.html
- http://secunia.com/advisories/16410
- http://www.osvdb.org/18735
- http://www.securityfocus.com/bid/14549
- http://www.vupen.com/english/advisories/2005/1402
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21839