RULE(RULE ID:332839)

Rule General Information
Release Date: 2021-03-26
Rule Name: McAfee ePolicy Orchestrator SiteManager ActiveX VerifyPackageCatalog Buffer Overflow Vulnerability (CVE-2007-1498)
Severity:
CVE ID:
Rule Protection Details
Description: A vulnerability exists in the McAfee ePolicy Orchestrator (ePO), and the Protection Pilot products. The flaw is caused by insufficient bounds-checking of user-supplied input within the SiteManager ActiveX Control component. A remote attacker may exploit this vulnerability via a specially crafted web page to cause stack-based buffer overflow on the target host and execute arbitrary code in the context of the currently logged in user. In an attack case where code injection is not successful, Internet Explorer (or the application processing the malicious HTML file) will terminate abnormally. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:22952
http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052960.html
http://securityreason.com/securityalert/2444
http://www.kb.cert.org/vuls/id/714593
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit: