Vulnerabilities > CVE-2018-6703 - Use After Free vulnerability in Mcafee Agent
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTTP header sent to the logging service.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 34 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Misc. |
NASL id | MCAFEE_EPO_AGENT_SB10258.NASL |
description | The version of McAfee Agent, formerly McAfee ePolicy Orchestrator (ePO) Agent, installed on the remote host is 5.0.x prior to 5.0.6 HF1267994, 5.5.x prior to 5.5.1 HF1267991, or 5.6.x prior to 5.6.0. It is, therefore, affected by a use-after-free vulnerability with the remote logging feature. An unauthenticated, remote attacker can exploit this issue, via specifically crafted HTTP header sent to the logging service, to cause the application to stop responding or remotely execute code. |
last seen | 2020-03-21 |
modified | 2019-07-19 |
plugin id | 126824 |
published | 2019-07-19 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/126824 |
title | McAfee Agent 5.0.x < 5.0.6 HF1267994 / 5.5.x < 5.5.1 HF1267994 / 5.6.x < 5.6.0 Use-After-Free Vulnerability (SB10258) |