Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0108 Master bypass vulnerability patched in McAfee Data Loss Prevention Endpoint 10 May 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee Data Loss Prevention Endpoint Operating System: Windows Impact/Access: Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-6664 Member content until: Friday, June 8 2018 OVERVIEW Multiple vulnerabilities have been identified in McAfee Data Loss Prevention Endpoint in versions prior to 10.0.500 or 11.0.400. [1] IMPACT McAfee has provided the following details: "Vulnerability Description It is possible to generate a Master Response String on the endpoint system that can switch DLP Endpoint protection to bypass mode without needing to generate a DLP Endpoint master response string in ePO. CVE-2018-6664 Application protections bypass a vulnerability in Microsoft Windows in McAfee Data Loss Prevention Endpoint (DLP Endpoint) 10 and DLP Endpoint 11, allowing authenticated users to bypass the product block action via a command-line utility. NOTE: The following links were not yet populated with CVE details at the time of publication of this Security Bulletin. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6664 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6664" [1] MITIGATION The vendor recommends users apply DLP Endpoint 10.0.500 or 11.0.400 on all affected systems. There are no mitigations or workarounds. [1] REFERENCES [1] Data Loss Prevention Endpoint update fixes master bypass vulnerability (CVE-2018-6664) https://kc.mcafee.com/corporate/index?page=content&id=SB10233 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWvOMsox+lLeg9Ub1AQg3GBAAqu2tJIf6XvmIIxP0+WXYlkO6VRKEFibH nz5hqU+j+UJQrRlH46UNpPimJHuG/Mk5N3tgBmzGsMwlLXZVCIeJtFtU2TmnzXxp 5BHhbPg5ZEtZphUMddXiLNT+z1/xuI5qjKZHCknaJrHgEI2wZJldWLjNBqNJJOMm FpsiBjcA5PXpYo54gi2tO9Lk5VYhTlK6/hIWfdXwF19vh5vNquzFv5QpwE709qGK xsXmr/WW5mjysGYgeBVj6H1yBQHFi/Ktvc2W+rH/beqc4OKofNunllSRNTWYZtPn uX0B3aJyKDSotXea+OvxOuPSgDsNKfUMx019TE2hKKcnXFndAFrKRPfnRXSVewjs WzV8+jat7lTyMehu/GuWCDWAAPzptinfOukaU25YlbB3DNEjSlFtmKXLKJyKkcNb hyiP+NZP4AWPtNq3NjzAWeeEcW6diHSV6dnKIe2hGLK20+6NtXJ5HEcIehTHQYZz dNhTK0sVQtx/0G169/VgoIuBsFjRIqHJBAxbYtkvxQBJg8UWcQEXyV0DUTykbUXP kVO2AYqidg16wvn+Xz8E+GG0bhSpxlXLzzaRsWW9Fhtb+c3EdIPwhRrcBjOV/8nL W6hsm9BIjnRw7cC2Ch4OTOLbf675ry4X/ttPr3OUbr6gDvyUPRGg1+YMNR1yDEDi Auqz1afPArg= =7iYr -----END PGP SIGNATURE-----