Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2015.0116 Intel Security - Security Bulletin: VirusScan Enterprise 8.8 Patch 6 fixes a memory allocation flaw 11 December 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee VirusScan Enterprise Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade Member content until: Sunday, January 10 2016 OVERVIEW A vulnerability has been identified in McAfee VirusCan Enterprise prior to version 8.8 patch 6. [1] IMPACT The vendor has provided the following information about the vulnerability: "The Buffer Overflow Protection (BOP) feature of VirusScan Enterprise (VSE) 8.8.0 allocates memory pages with RWX permissions at predictable addresses in processes that it protects. For the flaw to be exposed, the BOP feature must be enabled and the targeted application must be included in the list of applications that are protected by BOP. Only in the case of a vulnerable third-party application protected by BOP, an attacker can leverage the allocated RWX page to copy and then execute malicious code after exploiting an existing third-party application vulnerability." [1] MITIGATION The vnedor recommends updating to the latest version. [1] REFERENCES [1] Intel Security - Security Bulletin: VirusScan Enterprise 8.8 Patch 6 fixes a memory allocation flaw https://kc.mcafee.com/corporate/index?page=content&id=sb10142 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVmpF736ZAP0PgtI9AQIVPxAAnXXoc/QtNnGY5pAlAU9ji20NhIkqE6eA SeXJVmRbOvsnpAnH5FKBlHRQxPZY+GehZnLveEJGftjwBKD8HNXnPSNzAAj8hraO Xh7K8BoldyIoomwdXZYyQOEgZV8zRrmJUageczRvXZOg6VNhbspenM+syUSrdYLi loGhaDIBHtAKxXYbO8Qlj2ZaXv68ptYVV7D+o9H63ItrLfTxpzdLNVUIAqh3NvfQ eR50TLtLeqv8yT4NgkDUi5ZfMaBxeY6kR8PxiH2aHehxlnWm9NEeqV+2UuoRF4yT VPQwq9yYQWpRZHXtXmgl4cInbPO6IoFhQn0yuh65EAm1GZivBa9hEKbO5VMtoteT m99GvD/YRHvA7EDqvqUkXD4ZZKdeWWHS85maaLVxtgHiLt5BgOf5ie35h71UGFE0 +0PKVHC5z6ZMDWtQ7WxcRQKyDhGUQpM+LCDbbG+15Yet2GCh3QbFdOYbQVzlShYQ hhFOx0MQygbc6wC5NJ+jGUkawyXIhnKTmQn5pAjIcyAGSVYZH+CLPjvmrSdDR9oK VWxS0XuadTTT56p7LC/ME9sGHIcuT+ExPd/IrFp5j0kTlCHM0PgWbIsm0ZqleYq/ 17VdfkCagXu9GGysviBggiEr4NyP8IwzB99kH/0/Wh2cxF7yLDgZD7Zu5KzTUNH7 wHIdFclpJlc= =dbU6 -----END PGP SIGNATURE-----