BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

McAfee Virtual Technician ActiveX Control Remote Code Execution

Disclosed April 30, 2012    Workaround Available

Vulnerability Description:

McAfee Virtual Technician contains a vulnerability whereby the GetObject() function may allow for arbitrary classes to be specified. This allows an attacker to load objects that may allow for arbitrary system commands, effectively granting arbitrary code execution. 

Vendors:

McAfee

Vulnerable Software/Devices:

  • McAfee Virtual Technician v6.3.0.1911

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

Beyond Trust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 16310 - McAfee Virtual Technician ActiveX Control Remote Code Execution

Mitigation:

Set the kill-bit for the vulnerable ActiveX control: 2EBE1406-BE0E-44E6-AE10-247A0C5AEDCF

Links:

Original Advisory

CVE(s):

None

Leave a Reply