First published: Tue Sep 22 2015(Updated: )
McAfee Enterprise Security Manager (ESM), Enterprise Security Manager/Log Manager (ESMLM), and Enterprise Security Manager/Receiver (ESMREC) before 9.3.2MR18, 9.4.x before 9.4.2MR8, and 9.5.x before 9.5.0MR7 allow remote authenticated users to execute arbitrary OS commands via a crafted filename, which is not properly handled when downloading the file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Enterprise Security Manager | <=9.3.2 | |
HP Enterprise Security Manager | <=9.4.2 | |
HP Enterprise Security Manager | <=9.5.0 | |
McAfee Enterprise Security Manager | <=9.3.2 | |
McAfee Enterprise Security Manager | <=9.4.2 | |
McAfee Enterprise Security Manager | <=9.5.0 | |
McAfee Enterprise Security Manager | <=9.3.2 | |
McAfee Enterprise Security Manager | <=9.4.2 | |
McAfee Enterprise Security Manager | <=9.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7310 has a high severity rating due to its potential for remote code execution affecting McAfee Enterprise Security Manager products.
To fix CVE-2015-7310, upgrade to versions 9.3.2MR18, 9.4.2MR8, or 9.5.0MR7 or later of McAfee Enterprise Security Manager.
Affected versions for CVE-2015-7310 include McAfee Enterprise Security Manager prior to 9.3.2MR18, 9.4.x before 9.4.2MR8, and 9.5.x before 9.5.0MR7.
CVE-2015-7310 can be exploited by remote authenticated users who can execute arbitrary OS commands via crafted file names.
Products impacted by CVE-2015-7310 include McAfee Enterprise Security Manager, Log Manager, and Receiver versions affected prior to the respective fixed releases.