Korean
<< Back
VID 28159
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The McAfee ePolicy Orchestrator, according to its version number, has a buffer overflow vulnerability. McAfee ePolicy Orchestrator(ePO) is the all-in-one tool for centralized, enterprise-class system security management and reporting. McAfee ePolicy Orchestrator version 3.5.0 patch 5 and earlier versions are vulnerable to a buffer overflow vulnerability, caused by improper bounds checking of source headers. By sending a request containing an overly long source header, a remote attacker could overflow a buffer and execute arbitrary code on the affected host.

* Note: This check solely relied on the version number of the McAfee ePolicy Orchestrator program installed on the remote system to assess this vulnerability, so this might be a false positive.

* References:
http://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=8611438&sliceId=SAL_Public&command=show&forward=nonthreadedKC&kcId=8611438
http://www.milw0rm.com/exploits/2467
http://secunia.com/advisories/22222/

* Platforms Affected:
McAfee, Inc., McAfee ePolicy Orchestrator version 3.5.0 patch 5 and earlier versions
Microsoft Windows Any version
Recommendation Upgrade to the latest version of McAfee ePolicy Orchestrator (3.5.0 Patch 6), available from the McAfee ePolicy Orchestrator Download Web site at http://www.mcafee.com/us/enterprise/downloads/index.html
Related URL CVE-2006-5156 (CVE)
Related URL 20288 (SecurityFocus)
Related URL 29307 (ISS)