File: 2562.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (72 lines) | stat: -rw-r--r-- 1,782 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
Rule:

--
Sid:
2562

--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with the server component of McAfee's ePolicy Orchestrator (ePO).

--
Impact:
A successful attack may permit an attacker to upload malicious code on
the ePolicy Orchestrator server that may subsequently deliver the
malicious code to ePolicy agents.

--
Detailed Information:
There is a problem with access authentication in McAfee's ePolicy Orchestrator
server.  This product is responsible for distributing packages and code to
ePolicy agents, making this a potentially widespread and damaging attack in
a network.  Because of a failure to authenticate credentials,
an attacker can perform administrator functions, such as file uploads, by
connecting the the ePO web server.  The malicious files may be pushed to
the ePO agents by the ePO Orchestrator.

--
Affected Systems:
McAfee ePolicy Orchestrator 2.5.0
McAfee ePolicy Orchestrator 2.5.1 before Patch 14
McAfee ePolicy Orchestrator 3.0 before Patch 4 for 2.0 SP2A

--
Attack Scenarios:
An attacker can attempt to upload a malicious file using the web
server of the ePO Orchestrator. The file may be subsequently
pushed by the Orchestrator to ePO agents.

--
Ease of Attack:
Simple.

--
False Positives:
If a valid administrator connects to the ePO server and uploads
files, the alert will trigger.

--
False Negatives:
If the ePO server listens on a port other than 81, no alert will
trigger.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References

CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0038

Bugtraq:
http://www.securityfocus.com/bid/10200

--