First published: Wed Aug 10 2011(Updated: )
The MyAsUtil ActiveX control in MyAsUtil5.2.0.603.dll in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to bypass the MyASUtil.SecureObjectFactory.CreateSecureObject domain execution policy using a cross-site scripting (XSS) attack, execute arbitrary code using the MyASUtil.InstallInfo.RunUserProgram function, and possibly conduct other unspecified attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee SaaS Endpoint Protection | <=5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3006 is categorized as a high severity vulnerability due to its potential for remote code execution.
CVE-2011-3006 affects McAfee SaaS Endpoint Protection versions up to and including 5.2.1.
To mitigate CVE-2011-3006, it is recommended to update McAfee SaaS Endpoint Protection to a version beyond 5.2.1.
CVE-2011-3006 is a cross-site scripting (XSS) vulnerability that allows attackers to bypass security policies.
Yes, exploitation of CVE-2011-3006 can lead to unauthorized remote code execution, potentially resulting in data breaches.