Vulnerabilities > CVE-2008-1855 - Resource Management Errors vulnerability in Mcafee CMA
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
FrameworkService.exe in McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 and earlier, as used by ePolicy Orchestrator (ePO) and ProtectionPilot (PrP), allows remote attackers to corrupt memory and cause a denial of service (CMA Framework service crash) via a long invalid method in requests for the /spin//AVClient//AVClient.csp URI, a different vulnerability than CVE-2006-5274.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | Mcafee EPO 4.0 FrameworkService.exe Remote Denial of Service Exploit. CVE-2008-1855. Dos exploit for windows platform |
file | exploits/windows/dos/5343.py |
id | EDB-ID:5343 |
last seen | 2016-01-31 |
modified | 2008-04-02 |
platform | windows |
port | |
published | 2008-04-02 |
reporter | muts |
source | https://www.exploit-db.com/download/5343/ |
title | Mcafee EPO 4.0 - FrameworkService.exe Remote Denial of Service Exploit |
type | dos |
Nessus
NASL family | CGI abuses |
NASL id | MCAFEE_CMA_3_6_0_603.NASL |
description | According to its banner, the version of the McAfee Common Management Agent (CMA) running on the remote host is prior to 3.6.0.603. It is, therefore, affected by a denial of service vulnerability in FrameworkService.exe due to a memory corruption issue. An unauthenticated, remote attacker can exploit this, via a long invalid method in requests to the /spin//AVClient//AVClient.csp URI, to cause the CMA Framework Service to crash. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 42871 |
published | 2009-11-23 |
reporter | This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/42871 |
title | McAfee Common Management Agent < 3.6.0.603 FrameworkService.exe AVClient DoS |
code |
|
References
- http://secunia.com/advisories/29637
- http://secunia.com/advisories/29637
- http://www.offensive-security.com/0day/mcafee_again.py.txt
- http://www.offensive-security.com/0day/mcafee_again.py.txt
- http://www.securityfocus.com/bid/28573
- http://www.securityfocus.com/bid/28573
- http://www.securitytracker.com/id?1019794
- http://www.securitytracker.com/id?1019794
- http://www.vupen.com/english/advisories/2008/1122/references
- http://www.vupen.com/english/advisories/2008/1122/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41597
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41597
- https://knowledge.mcafee.com/article/219/615324_f.SAL_Public.html
- https://knowledge.mcafee.com/article/219/615324_f.SAL_Public.html
- https://www.exploit-db.com/exploits/5343
- https://www.exploit-db.com/exploits/5343