// For flags

CVE-2011-3007

 

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method.

El myCIOScn control ActiveX (myCIOScn.dll) en McAfee Endpoint SaaS Protection v5.2.1 y anteriores, permite a atacantes remotos escribir en archivos arbitrarios especificando un nombre de archivo arbitrario en el parámetro MyCioScan.Scan.ReportFile, como se ha demostrado mediante la inyección de secuencias de comandos en un archivo de registro y la ejecución de código arbitrario usando el método de MyCioScan.Scan.Start.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-08-02 CVE Reserved
  • 2011-08-10 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mcafee
Search vendor "Mcafee"
Saas Endpoint Protection
Search vendor "Mcafee" for product "Saas Endpoint Protection"
<= 5.2.1
Search vendor "Mcafee" for product "Saas Endpoint Protection" and version " <= 5.2.1"
-
Affected