CVE-2009-1348
https://notcve.org/view.php?id=CVE-2009-1348
The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive. El AV engine antes de DAT 5600 en McAfee VirusScan, Total Protection, Internet Security, SecurityShield para Microsoft ISA Server, Security para Microsoft Sharepoint, Security para Email Servers, Email Gateway, y Active Virus Defense permite a atacantes remotos eludir la detección de virus a través de (1) un campo Headflags inválido de un archivo RAR malformado, (2) un campo Packsize inválido de un archivo RAR malformado, o (3) un campo Filelength de un archivo ZIP malformado. • http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html http://secunia.com/advisories/34949 http://www.securityfocus.com/archive/1/503173/100/0/threaded http://www.securityfocus.com/bid/34780 https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT • CWE-20: Improper Input Validation •
CVE-2008-3605
https://notcve.org/view.php?id=CVE-2008-3605
Unspecified vulnerability in McAfee Encrypted USB Manager 3.1.0.0, when the Re-use Threshold for passwords is nonzero, allows remote attackers to conduct offline brute force attacks via unknown vectors. Vulnerabilidad no especificada en McAfee Encrypted USB Manager 3.1.0.0, cuando Re-use Threshold para contraseñas es nonzero (distinto de cero), permite a atacantes remotos llevar a cabo ataques de fuerza bruta sin conexión mediante vectores desconocidos. • http://secunia.com/advisories/31433 http://www.mcafee.com/apps/downloads/security_updates/hotfixes.asp?region=us&segment=enterprise http://www.securityfocus.com/bid/30630 http://www.securitytracker.com/id?1020648 http://www.vupen.com/english/advisories/2008/2324 https://exchange.xforce.ibmcloud.com/vulnerabilities/44368 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-1855 – Mcafee EPO 4.0 - 'FrameworkService.exe' Remote Denial of Service
https://notcve.org/view.php?id=CVE-2008-1855
FrameworkService.exe in McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 and earlier, as used by ePolicy Orchestrator (ePO) and ProtectionPilot (PrP), allows remote attackers to corrupt memory and cause a denial of service (CMA Framework service crash) via a long invalid method in requests for the /spin//AVClient//AVClient.csp URI, a different vulnerability than CVE-2006-5274. FrameworkService.exe en McAfee Common Management Agent (CMA) 3.6.0.574 Patch 3 y anteriores, usado por ePolicy Orchestrator (ePO) y ProtectionPilot (PrP), permite a atacantes remotos corromper la memoria y provocar una denegación de servico (caída del servicio CMA Framework) a través de un método largo inválido en una petición al URI /spin//AVClient//AVClient.csp. Vulnerabilidad distinta del CVE-2006-5274. • https://www.exploit-db.com/exploits/5343 http://secunia.com/advisories/29637 http://www.offensive-security.com/0day/mcafee_again.py.txt http://www.securityfocus.com/bid/28573 http://www.securitytracker.com/id?1019794 http://www.vupen.com/english/advisories/2008/1122/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41597 https://knowledge.mcafee.com/article/219/615324_f.SAL_Public.html • CWE-399: Resource Management Errors •
CVE-2008-1357 – McAfee Framework ePolicy 3.x - Orchestrator '_naimcomn_Log' Remote Format String
https://notcve.org/view.php?id=CVE-2008-1357
Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082. NOTE: this issue only exists when the debug level is 8. Vulnerabilidad en el formato de cadena en la función logDetail de applib.dlld en McAfee Common Management Agent (CMA) 3.6.0.574 (Parche 3) y anteriores, como se utiliza en ePolicy Orchestrator 4.0.0 build 1015, permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección a través de formatos de especificadores de formatos de cadena en un fichero de envío en una solicitud AgentWakeup en el puerto 8082. NOTA: esta vulnerabilidad sólo sucede cuando se está en un nivel 8 de depuración. • https://www.exploit-db.com/exploits/31399 http://aluigi.altervista.org/adv/meccaffi-adv.txt http://secunia.com/advisories/29337 http://securityreason.com/securityalert/3748 http://www.securityfocus.com/archive/1/489476/100/0/threaded http://www.securityfocus.com/bid/28228 http://www.securitytracker.com/id?1019609 http://www.vupen.com/english/advisories/2008/0866/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41178 https://knowledge.mcafee.com/article/234/615103_f.sal& • CWE-134: Use of Externally-Controlled Format String •
CVE-2008-0127 – McAfee E-Business Server 8.5.2 - Remote Code Execution / Denial of Service (PoC)
https://notcve.org/view.php?id=CVE-2008-0127
The administration interface in McAfee E-Business Server 8.5.2 and earlier allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a long initial authentication packet. La interfaz de administración en McAfee E-Business Server 8.5.2 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) y ejecutar código de su elección mediante un paquete de autenticación inicial largo. • https://www.exploit-db.com/exploits/4878 http://secunia.com/advisories/28408 http://securityreason.com/securityalert/3530 http://securitytracker.com/id?1019170 http://www.securityfocus.com/archive/1/485992/100/0/threaded http://www.securityfocus.com/archive/1/486035/100/0/threaded http://www.securityfocus.com/bid/27197 http://www.vupen.com/english/advisories/2008/0087 https://exchange.xforce.ibmcloud.com/vulnerabilities/39561 https://exchange.xforce.ibmcloud.com/vulnerabilities/39563 ht • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •