Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0007 A number of vulnerabilities have been identified in McAfee Vulnerability Manager 17 January 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee Vulnerability Manager Operating System: Windows Server 2003 VMware ESX Server Impact/Access: Cross-site Request Forgery -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-1473 CVE-2014-1472 Member content until: Sunday, February 16 2014 OVERVIEW A number of vulnerabilities have been identified in McAfee Vulnerability Manager 7.0.11, 7.5.4 and 7.5.5. [1] IMPACT The vendor has provided the following details regarding these vulnerabilities: "XSS: Several web pages presented by the MVM Enterprise Manager are susceptible to Reflected Cross-Site Scripting (XSS) attacks by modification of the HTTP request. These vulnerabilities could allow arbitrary HTML code to be reflected in the response web page. However, these attacks generally require standing up a man-in-the-middle (MITM) system to capture and modify specific requests, which are then forwarded by the MITM to the actual Enterprise Manager web site. The modified request is not stored, so cannot be replayed later nor be used to inject HTML code into another users browser session. Another vector of attack involves a specifically crafted HTML link, sent via email or by other electronic means, which once clicked could be used to execute arbitrary HTML code in the users browser. CSRF: Several web pages presented by the MVM Enterprise Manager web site are susceptible to Cross-Site Request Forgery (CSRF) attacks by modification of the HTTP request. These vulnerabilities could allow arbitrary HTML code to be reflected in the response web page. However, these attacks generally require standing up a man-in-the-middle system, to capture and modify specific requests, which are then forwarded by the MITM to the actual Enterprise Manager web site. The modified request is not stored, so cannot be replayed later nor be used to inject HTML code into another users browser session." [1] MITIGATION The vendor has released hotfixes to correct these issues: "For MVM 7.5.5: 7.5.5.05002_EM For MVM 7.5.4: 7.5.4.05007_EM For MVM 7.0.11: 7.0.11.05002_EM" [1] REFERENCES [1] McAfee Security Bulletin McAfee Vulnerability Manager hotfixes remediate XSS and CSRF vulnerabilities reported by NATO https://kc.mcafee.com/corporate/index?page=content&id=SB10061 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUtiUWhLndAQH1ShLAQIJphAAtOtEoZCyoLsHx5Ve5BkDP852IwHIhA2e Wadg9aMOTg6mVtn9zWXrkhfulQzI/ljT0JLZi+TMYNixHMFoAeHGR++1GDWvIC4A yDz2Mt6SbyP6xmhkp7u0I7NDqwgA6bN0djl0vgAoahF06G1Ch2kk+itKTuH3jTXr 6upmNW+4uBMrbjlfQh75ivVsdCFc9i338KDRMwEVUUulIG4JOECmX7Zdb4bUK+A3 J8GRd2cvk9I/TIxVZNthdOOm1Py/HJpF+7ooI5f7cayPf7m2yscRrXAEOF7VThJe BsvNO9vb6Aqnmag+QlOQGpnBv3nPT2u/mivk84lt59bORBY+AqHZkwFGYupxXXEu haGeCvEWn8Q6Z7vgg564FqTHl6irjOiyeFWJXFlMkOamdf5sR6HQgsdvuAEHMxbx ewvorRL1lu3GhZ03WitGBFDWqDp1jOLbEJPYmMOs0Mgvd8dPzlWCV5iqxo26uRto cHJFKsXT9drpijCJaSUqyhvXw0igocBZrKlAtn0cy8H3DX94Rx368OQ1iu9ipRwC 0PdhIMp8i4Zww0nkNoF67+TA1rFNnMVFGruRcmpklVy8JgAalw5v8rSDf7eMsTDy xxCbDPiRCCWYr3jPUtMZTqiFj/62eg/pRnc0d/Br8+sfBDk/LZ7+F0g/NB3UAjTa Jrzv+pAoz64= =SCCw -----END PGP SIGNATURE-----