First published: Tue Mar 14 2017(Updated: )
Unauthorized execution of binary vulnerability in McAfee (now Intel Security) McAfee Application Control (MAC) 6.0.0 before hotfix 9726, 6.0.1 before hotfix 9068, 6.1.0 before hotfix 692, 6.1.1 before hotfix 399, 6.1.2 before hotfix 426, and 6.1.3 before hotfix 357 and earlier allows attackers to create a malformed Windows binary that is considered non-executable and is not protected through the whitelisting protection feature via a specific set of circumstances.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Application Control | =6.0.0 | |
Mcafee Application Control | =6.0.1 | |
Mcafee Application Control | =6.1.0 | |
Mcafee Application Control | =6.1.1 | |
Mcafee Application Control | =6.1.2 | |
Mcafee Application Control | =6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9920 is considered a high severity vulnerability due to its potential for unauthorized execution of binary code.
To fix CVE-2014-9920, you need to apply the appropriate hotfix for your version of McAfee Application Control that is specified in the vulnerability details.
CVE-2014-9920 affects McAfee Application Control versions 6.0.0, 6.0.1, 6.1.0, 6.1.1, 6.1.2, and 6.1.3 prior to their respective hotfixes.
CVE-2014-9920 can be exploited by attackers to execute arbitrary binaries without authorization.
While a specific workaround is not detailed, it is recommended to limit access to the affected systems until the hotfix can be applied.