Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0197 McAfee Security Bulletin - ePolicy Orchestrator update fixes two Java vulnerabilities (CVE-2018-2942 and CVE-2018-2952) 17 August 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee ePolicy Orchestrator Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-2952 CVE-2018-2942 Member content until: Sunday, September 16 2018 Reference: ASB-2018.0169 ESB-2018.2311 ESB-2018.2144 OVERVIEW Multiple vulnerabilities have been identified in McAfee ePolicy Orchestrator. [1] The following versions are affected: ePO 5.3.3, 5.3.2, 5.3.1, and 5.3.0 ePO 5.9.1 and 5.9.0 IMPACT The vendor has provided the following details regarding the vulnerabilities: "CVE-2018-2942 Difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2942 CVE-2018-2952 Difficult to exploit vulnerability allows an unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" [1] MITIGATION McAfee advises upgrading to the latest releases below to fix these issues: "Users of ePO 5.3.2 or earlier are recommended to upgrade to ePO 5.3.3 or 5.9.1 and apply EPO5xHF1248224. Alternatively, you may upgrade to ePO 5.10. Users of ePO 5.3.3 are recommended to apply EPO5xHF1248224 or upgrade to ePO 5.10. Users of ePO 5.9.0 are recommended to upgrade to ePO 5.9.1 and apply EPO5xHF1248224. Alternatively, you may upgrade to ePO 5.10. Users of ePO 5.9.1 are recommended to apply EPO5xHF1248224 or upgrade to ePO 5.10."[1] REFERENCES [1] McAfee Security Bulletin - ePolicy Orchestrator update fixes two Java vulnerabilities (CVE-2018-2942 and CVE-2018-2952) https://kc.mcafee.com/corporate/index?page=content&id=SB10247 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW3ZoGmaOgq3Tt24GAQjUXRAAs/4hfGjhzmoFdEUZGKz+7xPAyzvR6/ao x8+WeR9sh+Z2LZmzR1SdZZdN7EMbA/3E3cbEd0YQ5dVXDlYFtVPEd622Qojmfwb9 GXt9TILCtJsJiNXf1cHSANaehb9erGHNP/rmZGrSmCmBUWYaLG3kv1ABITOtKQb4 czJeQxoQUhtu0Yn8hGWmwnpPpSlHoKiwPOBqTHUIJH+w+HKRxxSj50cNwDYHn/SI FZRXGaUUgzVIMiKLte3YZuXOrUxAl3OBfQL2b7O1nENQRjc6SoyGdqYBi/saYb2c DPYMw5roL7iROysFTHRHSrxtdbtshObsZVsGPDJQi/176y3O9/7gh/sB+QvHwaaJ WQxLsz+0wi1xotSBq/o2eKZWcgcgwlY9oLPoiSyHolk0CiE3wD3UEMAjhougPp72 M0VFOD7O1STUUm2qm20E6ndqeb1eLvK7TcS1EGb3rK5cxNu19ZKU9njuJnP/4aAV Q2glq9HJYvsi7Lb6QfZZq3/pgFTPEqx8ZctToOyIOGvn38HBshrUSnQGYFkCvdPi y2B4iYlz56A9OFeZHN4jBJdiCLw93vqITn0roMHKDt57YoYAv4T9V1BuE41sWy6P LxvP25LPsmDAk8+VpWdyEtZHQed6+GQl7/p57cQhFC83iRfLTk4nZeJMzlsjiGNN gwu8B63e1Cg= =p89Q -----END PGP SIGNATURE-----