CVE-2006-5156 – McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 - Source Remote
https://notcve.org/view.php?id=CVE-2006-5156
Buffer overflow in McAfee ePolicy Orchestrator before 3.5.0.720 and ProtectionPilot before 1.1.1.126 allows remote attackers to execute arbitrary code via a request to /spipe/pkg/ with a long source header. Desbordamiento de búfer en McAfee ePolicy Orchestrator anterior a 3.5.0.720 y ProtectionPilot anterior a 1.1.1.126 permite a atacantes remotos ejecutar código de su elección mediante una petición a /spipe/pkg/ con una cabecera fuente larga. • https://www.exploit-db.com/exploits/2467 https://www.exploit-db.com/exploits/16783 http://download.nai.com/products/patches/ePO/v3.5/EPO3506.txt http://download.nai.com/products/patches/protectionpilot/v1.1.1/PRP1113.txt http://knowledge.mcafee.com/SupportSite/search.do?cmd=displayKC&docType=kc&externalId=8611438&sliceId=SAL_Public&dialogID=2997768&stateId=0%200%202995803 http://knowledge.mcafee.com/article/365/8611438_f.SAL_Public.html http://lists.grok.org.uk/pipermail/full-disclosure/2006 •
CVE-2006-4886
https://notcve.org/view.php?id=CVE-2006-4886
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, possibly due to an interface-related race condition. El componente VirusScan On-Access Scan en McAfee VirusScan Enterprise 7.1.0 y Scan Engine 4.4.00 permite a usuarios locales con privilegios evitar restricciones de seguridad y desactivar la opción On-Access Scan abriendo el programa desde la barra de tareas y haciendo clic rápidamente en el botón Disable, posiblemente debido a una "race condition" relacionada con la interfaz. • http://securityreason.com/securityalert/1605 http://www.securityfocus.com/archive/1/446220/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/28971 •
CVE-2006-3961 – McAfee Subscription Manager - Remote Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-3961
Buffer overflow in McSubMgr ActiveX control (mcsubmgr.dll) in McAfee Security Center 6.0.23 for Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, and QuickClean allows remote user-assisted attackers to execute arbitrary commands via long string parameters, which are later used in vsprintf. Desbordamiento de búfer en control ActiveX McSubMgr (mcsubmgr.dll) en McAfee Security Center 6.0.23 para Internet Security Suite 2006, Wireless Home Network Security, Personal Firewall Plus, VirusScan, Privacy Service, SpamKiller, AntiSpyware, y QuickClean permite a atacantes con la intervención del usuario ejecutar comandos de su elección a través de paráametros string, los cuales son posteriormente usados en vsprintf. • https://www.exploit-db.com/exploits/16510 http://secunia.com/advisories/21264 http://securitytracker.com/id?1016614 http://ts.mcafeehelp.com/faq3.asp?docid=407052 http://www.eeye.com/html/research/advisories/AD2006807.html http://www.eeye.com/html/research/upcoming/20060719.html http://www.kb.cert.org/vuls/id/481212 http://www.osvdb.org/27698 http://www.securityfocus.com/archive/1/442495/100/100/threaded http://www.securityfocus.com/bid/19265 http://www.vupen. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-3623
https://notcve.org/view.php?id=CVE-2006-3623
Directory traversal vulnerability in Framework Service component in McAfee ePolicy Orchestrator agent 3.5.0.x and earlier allows remote attackers to create arbitrary files via a .. (dot dot) in the directory and filename in a PropsResponse (PackageType) request. Vulnerabilidad de salto de directorio en el componente Framework Service en McAfee ePolicy Orchestrator agent 3.5.0.x y anteriores permite a atacantes remotos crear archivos de su elección a través de una secuencia .. (punto punto) en el directorio y nombre de archivo en una respuesta PropsResponse (PackageType). • http://secunia.com/advisories/21037 http://securitytracker.com/id?1016501 http://www.eeye.com/html/research/advisories/AD20060713.html http://www.osvdb.org/27158 http://www.securityfocus.com/archive/1/440077/100/0/threaded http://www.securityfocus.com/bid/18979 http://www.vupen.com/english/advisories/2006/2796 https://exchange.xforce.ibmcloud.com/vulnerabilities/27738 •
CVE-2006-3575
https://notcve.org/view.php?id=CVE-2006-3575
Unknown vulnerability in the Buffer Overflow Protection in McAfee VirusScan Enterprise 8.0.0 allows local users to cause a denial of service (unstable operation) via a long string in the (1) "Process name", (2) "Module name", or (3) "API name" fields. Vulnerabilidad desconocida en la protección de desbordamiento de búfer en McAfee VirusScan Enterprise 8.0.0 permite a usuarios locales provocar denegación de servicio (operación inestable) a través de una cadena larga en los campos (1) "Process name", (2) "Module name", o (3) "API name". • http://securityreason.com/securityalert/1216 http://securitytracker.com/id?1016450 http://www.securityfocus.com/archive/1/439430/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/27625 •