-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0099
     McAfee Management of Native Encryption update fixes vulnerability
                               30 April 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Management of Native Encryption
Operating System:     Mac OS
Impact/Access:        Root Compromise -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-6662  
Member content until: Wednesday, May 30 2018

OVERVIEW

        A vulnerability exists in McAfee Management of Native Encryption 4.1.3 
        and earlier which allows malicious local users to gain root access to 
        the system. [1]


IMPACT

        The vendor has provided the following details regarding the vulnerability:
         
        "During policy enforcement, a user may be asked to enter a password to 
        activate FileVault full disk encryption. A malicious user could enter a 
        specially crafted password that would allow them to gain root access to 
        the system." [1]


MITIGATION

        The vendor has provided the following details regarding mitigation:
         
        "To remediate this issue, ensure that MNE 4.1.4 or later is installed 
        on all systems that use the macOS operating system." [1]


REFERENCES

        [1] McAfee Security Bulletin - Management of Native Encryption update
            fixes CWE-78 vulnerability (CVE-2018-6662)
            https://kc.mcafee.com/corporate/index?page=content&id=SB10232

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9fDW
-----END PGP SIGNATURE-----