First published: Wed Aug 22 2012(Updated: )
McAfee Application Control and Change Control 5.1.x and 6.0.0 do not enforce an intended password requirement in certain situations involving attributes of the password file, which allows local users to bypass authentication by executing a command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Application Control | =5.1.0 | |
Mcafee Application Control | =5.1.1 | |
Mcafee Application Control | =5.1.2 | |
Mcafee Application Control | =6.0.0 | |
Mcafee Change Control | =5.1.0 | |
Mcafee Change Control | =5.1.1 | |
Mcafee Change Control | =5.1.2 | |
Mcafee Change Control | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4593 is classified as a high severity vulnerability due to its potential to allow unauthorized command execution.
To fix CVE-2012-4593, upgrade to McAfee Application Control or Change Control version 6.0.1 or later, which includes the necessary security enhancements.
CVE-2012-4593 affects local users of McAfee Application Control and Change Control versions 5.1.x and 6.0.0.
CVE-2012-4593 is a local authentication bypass vulnerability that can be exploited by local users.
No, CVE-2012-4593 requires local access to the system for exploitation.