First published: Wed Aug 10 2011(Updated: )
The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection 5.2.1 and earlier allows remote attackers to write to arbitrary files by specifying an arbitrary filename in the MyCioScan.Scan.ReportFile parameter, as demonstrated by injecting script into a log file and executing arbitrary code using the MyCioScan.Scan.Start method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee SaaS Endpoint Protection | <=5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3007 has been classified as a high-severity vulnerability due to its potential for remote code execution.
The recommended fix for CVE-2011-3007 is to upgrade to a version of McAfee SaaS Endpoint Protection newer than 5.2.1.
CVE-2011-3007 allows remote attackers to write to arbitrary files on the system, which can lead to serious security breaches.
CVE-2011-3007 affects McAfee SaaS Endpoint Protection version 5.2.1 and earlier.
Yes, CVE-2011-3007 can be exploited remotely, allowing attackers to manipulate files on the affected system.