First published: Mon Mar 17 2008(Updated: )
Format string vulnerability in the logDetail function of applib.dll in McAfee Common Management Agent (CMA) 3.6.0.574 (Patch 3) and earlier, as used in ePolicy Orchestrator 4.0.0 build 1015, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in a sender field in an AgentWakeup request to UDP port 8082. NOTE: this issue only exists when the debug level is 8.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Agent | =4.0 | |
McAfee Common Management Agent | =3.0.6.453 | |
McAfee Common Management Agent | =3.5.5.438 | |
McAfee Common Management Agent | =3.6.438 | |
McAfee Common Management Agent | =3.6.453 | |
McAfee Common Management Agent | =3.6.546 | |
McAfee Common Management Agent | =3.6.574 | |
Trellix ePolicy Orchestrator | =4.0 | |
McAfee Framework | =3.6.569 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1357 is considered to have a high severity due to the potential for remote attackers to execute arbitrary code or cause a denial of service.
To fix CVE-2008-1357, you should upgrade to the latest version of McAfee Common Management Agent or apply any relevant patches provided by McAfee.
CVE-2008-1357 affects multiple versions of McAfee Common Management Agent and Trellix ePolicy Orchestrator.
Yes, CVE-2008-1357 can potentially allow remote attackers to execute arbitrary code, which may lead to unauthorized access.
CVE-2008-1357 is classified as a format string vulnerability.