First published: Tue Jan 12 2016(Updated: )
The swin.sys kernel driver in McAfee Application Control (MAC) 6.1.0 before build 706, 6.1.1 before build 404, 6.1.2 before build 449, 6.1.3 before build 441, and 6.2.0 before build 505 on 32-bit Windows platforms allows local users to cause a denial of service (memory corruption and system crash) or gain privileges via a 768 syscall, which triggers a zero to be written to an arbitrary kernel memory location.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Mcafee Application Control | =6.1.0 | |
Mcafee Application Control | =6.1.1 | |
Mcafee Application Control | =6.1.2 | |
Mcafee Application Control | =6.1.3 | |
Mcafee Application Control | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1715 has a high severity due to its potential for causing denial of service through memory corruption and system crashes.
To fix CVE-2016-1715, update McAfee Application Control to a version that is 6.1.0 build 706 or later, 6.1.1 build 404 or later, 6.1.2 build 449 or later, 6.1.3 build 441 or later, or 6.2.0 build 505 or later.
Affected versions for CVE-2016-1715 include McAfee Application Control 6.1.0 through 6.1.3 and 6.2.0 prior to respective build updates.
CVE-2016-1715 affects 32-bit Windows platforms running specific versions of McAfee Application Control.
CVE-2016-1715 is a local vulnerability that can be exploited by local users.