CVE-2007-2152
https://notcve.org/view.php?id=CVE-2007-2152
Buffer overflow in the On-Access Scanner in McAfee VirusScan Enterprise before 8.0i Patch 12 allows user-assisted remote attackers to execute arbitrary code via a long filename containing multi-byte (Unicode) characters. Desbordamiento de búfer en On-Access Scanner de McAfee VirusScan Enterprise versiones anteriores a 8.0i Patch 12, permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un nombre de fichero largo conteniendo caracteres multi-byte (Unicode). • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=515 http://secunia.com/advisories/24914 http://www.kb.cert.org/vuls/id/324929 http://www.securityfocus.com/bid/23543 http://www.securitytracker.com/id?1017928 http://www.vupen.com/english/advisories/2007/1435 https://exchange.xforce.ibmcloud.com/vulnerabilities/33732 https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=612750&command=show&forward=nonthreadedKC •
CVE-2007-1538
https://notcve.org/view.php?id=CVE-2007-1538
McAfee VirusScan Enterprise 8.5.0.i uses insecure permissions for certain Windows Registry keys, which allows local users to bypass local password protection via the UIP value in (1) HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\DesktopProtection or (2) HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\TVD\VirusScan Entreprise\CurrentVersion. NOTE: this issue has been disputed by third-party researchers, stating that the default permissions for HKEY_LOCAL_MACHINE\SOFTWARE does not allow for write access and the product does not modify the inherited permissions. There might be an interaction error with another product ** IMPUGNADA ** McAfee VirusScan Enterprise 8.5.0.i utiliza permisos inseguros para ciertas claves del registro de Windows, lo cual permite a usuarios locales evitar la protección local de contraseñas mediante el valor UIP en (1) HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\DesktopProtection o (2) HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\TVD\VirusScan Entreprise\CurrentVersion. NOTA: este asunto ha sido impugnado por investigadores de una tercera parte, afirmando que los permisos por defecto para HKEY_LOCAL_MACHINE\SOFTWARE no permiten la escritura y el producto no modifica los permisos heredados. Podría haber un error de interacción con otro producto. • http://homepage.mac.com/adonismac/Advisory/bypass_mcafee_entreprise_password.html http://homepage.mac.com/adonismac/Advisory/crack_mcafee_password_protection.html http://www.osvdb.org/33800 http://www.securityfocus.com/archive/1/463074/100/0/threaded http://www.securityfocus.com/archive/1/463091/100/0/threaded http://www.securityfocus.com/archive/1/463187/100/0/threaded http://www.securitytracker.com/id?1017791 •
CVE-2006-4886
https://notcve.org/view.php?id=CVE-2006-4886
The VirusScan On-Access Scan component in McAfee VirusScan Enterprise 7.1.0 and Scan Engine 4.4.00 allows local privileged users to bypass security restrictions and disable the On-Access Scan option by opening the program via the task bar and quickly clicking the Disable button, possibly due to an interface-related race condition. El componente VirusScan On-Access Scan en McAfee VirusScan Enterprise 7.1.0 y Scan Engine 4.4.00 permite a usuarios locales con privilegios evitar restricciones de seguridad y desactivar la opción On-Access Scan abriendo el programa desde la barra de tareas y haciendo clic rápidamente en el botón Disable, posiblemente debido a una "race condition" relacionada con la interfaz. • http://securityreason.com/securityalert/1605 http://www.securityfocus.com/archive/1/446220/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/28971 •
CVE-2005-4505 – McAfee VirusScan 8.0 - Path Specification Privilege Escalation
https://notcve.org/view.php?id=CVE-2005-4505
Unquoted Windows search path vulnerability in McAfee VirusScan Enterprise 8.0i (patch 11) and CMA 3.5 (patch 5) might allow local users to gain privileges via a malicious "program.exe" file in the C: folder, which is run by naPrdMgr.exe when it attempts to execute EntVUtil.EXE under an unquoted "Program Files" path. • https://www.exploit-db.com/exploits/26970 http://reedarvin.thearvins.com/20051222-01.html http://securityreason.com/securityalert/292 http://securitytracker.com/id?1015404 http://www.securityfocus.com/archive/1/420104/100/0/threaded http://www.securityfocus.com/bid/16040 http://www.vupen.com/english/advisories/2005/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/23815 •