CVE-2010-5166
https://notcve.org/view.php?id=CVE-2010-5166
Race condition in McAfee Total Protection 2010 10.0.580 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ** EN DISPUTA ** Condición de carrera en McAfee Total Protection 2010 v10.0.580 sobre Windows XP permite a usuarios locales evitar manejadores de kernel-mode hook, y ejecutar código malicioso que podría ser bloquedo por un manejador pero no por un detector de malware signature-based, a través de ciertos cambios en memoria user-space durante la ejecución de hook-handler , también conocido por argument-switch attack o ataque KHOBE. Nota: este problema está en disputa por terceras partes. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://www.f-secure.com/weblog/archives/00001949.html http://www.osvdb.org/67660 http://www.securit • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2012-4580
https://notcve.org/view.php?id=CVE-2012-4580
Cross-site scripting (XSS) vulnerability in McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote attackers to inject arbitrary web script or HTML via vectors related to the McAfee Security Appliance Management Console/Dashboard. Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en McAfee Email and Web Security v5.x (EWS) antes de v5.5 Patch 6 y v5.6 antes de la revisión v3 y McAfee Email Gateway (MEG) v7.0 antes de la revisión v1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores relacionados con la consola gestión y cuadro de mandos de McAfee Security Appliance. • https://kc.mcafee.com/corporate/index?page=content&id=SB10020 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-4585
https://notcve.org/view.php?id=CVE-2012-4585
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, allows remote authenticated users to read arbitrary files via a crafted URL. McAfee Email and Web Security v5.x (EWS) antes de v5.5 Patch 6 y v5.6 antes de la revisión 3 y McAfee Email Gateway (MEG) v7.0 antes de la revisión 1 permiten leer archivos de su elección a usuarios remotos autenticados a través de una URL maliciosa. • http://archives.neohapsis.com/archives/bugtraq/2012-03/0163.html https://kc.mcafee.com/corporate/index?page=content&id=SB10020 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-4598 – McAfee Virtual Technician 6.3.0.1911 MVT.MVTControl.6300 - ActiveX 'GetObject()' Code Execution
https://notcve.org/view.php?id=CVE-2012-4598
An unspecified ActiveX control in McAfee Virtual Technician (MVT) before 6.4, and ePO-MVT, allows remote attackers to execute arbitrary code or cause a denial of service (Internet Explorer crash) via a crafted web site. Control ActiveX no especificado en McAfee Virtual Technician (MVT) anteriores a v6.4, y ePO-MVT, permite a atacantes remotos ejecutar código o provocar una denegación de servicio (caída de Internet Explorer) a través de un sitio Web manipulado. • https://www.exploit-db.com/exploits/18805 https://www.exploit-db.com/exploits/18812 https://kc.mcafee.com/corporate/index?page=content&id=SB10028 •
CVE-2012-4584
https://notcve.org/view.php?id=CVE-2012-4584
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not properly encrypt system-backup data, which makes it easier for remote authenticated users to obtain sensitive information by reading a backup file, as demonstrated by obtaining password hashes. McAfee Email and Web Security v5.x (EWS) antes de v5.5 Patch 6 y v5.6 antes de la revisión 3 y McAfee Email Gateway (MEG) v7.0 antes de la revisión 1 no cifra apropiadamente la copia de seguridad del sistema, lo que hace que sea más fácil obtener información confidencial para los usuarios remotos autenticados mediante la lectura de un archivo de copia de seguridad. Por ejemplo con la obtención de hashes de contraseñas. • http://archives.neohapsis.com/archives/bugtraq/2012-03/0162.html https://kc.mcafee.com/corporate/index?page=content&id=SB10020 • CWE-310: Cryptographic Issues •