First published: Fri Aug 01 2003(Updated: )
Heap-based buffer overflow in ePO agent for McAfee ePolicy Orchestrator 2.0, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code via a POST request containing long parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | =2.0 | |
Trellix ePolicy Orchestrator | =2.5 | |
Trellix ePolicy Orchestrator | =2.5-sp1 | |
Trellix ePolicy Orchestrator | =2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0149 is considered critical due to the potential for remote code execution.
To fix CVE-2003-0149, upgrade to an unaffected version of McAfee ePolicy Orchestrator.
The affected versions under CVE-2003-0149 include ePolicy Orchestrator 2.0, 2.5, 2.5-sp1, and 2.5.1.
Yes, CVE-2003-0149 can be exploited remotely through specially crafted POST requests.
CVE-2003-0149 is a heap-based buffer overflow vulnerability.