Vulnerabilites related to McAfee - McAfee Total Protection (MTP)
cve-2017-4028
Vulnerability from cvelistv5
Published
2018-04-03 22:00
Modified
2024-09-17 01:25
Severity ?
EPSS score ?
Summary
Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters.
References
▼ | URL | Tags |
---|---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10193 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/97958 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | McAfee | McAfee Anti-Virus Plus (AVP) |
Version: 170329 < 29 Mar 2017 |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10193" }, { "name": "97958", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97958" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "McAfee Anti-Virus Plus (AVP)", "vendor": "McAfee", "versions": [ { "lessThan": "29 Mar 2017", "status": "affected", "version": "170329", "versionType": "custom" } ] }, { "product": "McAfee Endpoint Security (ENS)", "vendor": "McAfee", "versions": [ { "lessThan": "10.2 DAT V3 DAT 2932.0", "status": "affected", "version": "10.2", "versionType": "custom" } ] }, { "product": "McAfee Host Intrusion Prevention (Host IPS)", "vendor": "McAfee", "versions": [ { "lessThan": "8.0 Patch 9 Hotfix 1188590", "status": "affected", "version": "8.0", "versionType": "custom" } ] }, { "product": "McAfee Internet Security (MIS)", "vendor": "McAfee", "versions": [ { "lessThan": "29 Mar 2017", "status": "affected", "version": "170329", "versionType": "custom" } ] }, { "product": "McAfee Total Protection (MTP)", "vendor": "McAfee", "versions": [ { "lessThan": "29 Mar 2017", "status": "affected", "version": "170329", "versionType": "custom" } ] }, { "product": "McAfee Virus Scan Enterprise (VSE)", "vendor": "McAfee", "versions": [ { "lessThan": "8.8 Patch 8/9 Hotfix 1187884", "status": "affected", "version": "8.8", "versionType": "custom" } ] } ], "datePublic": "2017-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Maliciously misconfigured registry vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-04T09:57:01", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10193" }, { "name": "97958", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97958" } ], "source": { "advisory": "SB10193", "discovery": "EXTERNAL" }, "title": "SB10193 - consumer and corporate products - Maliciously misconfigured registry vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@mcafee.com", "DATE_PUBLIC": "2017-05-12T17:00:00.000Z", "ID": "CVE-2017-4028", "STATE": "PUBLIC", "TITLE": "SB10193 - consumer and corporate products - Maliciously misconfigured registry vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Anti-Virus Plus (AVP)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "170329", "version_value": "29 Mar 2017" } ] } }, { "product_name": "McAfee Endpoint Security (ENS)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "10.2", "version_value": "10.2 DAT V3 DAT 2932.0" } ] } }, { "product_name": "McAfee Host Intrusion Prevention (Host IPS)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "8.0", "version_value": "8.0 Patch 9 Hotfix 1188590" } ] } }, { "product_name": "McAfee Internet Security (MIS)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "170329", "version_value": "29 Mar 2017" } ] } }, { "product_name": "McAfee Total Protection (MTP)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "170329", "version_value": "29 Mar 2017" } ] } }, { "product_name": "McAfee Virus Scan Enterprise (VSE)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_name": "8.8", "version_value": "8.8 Patch 8/9 Hotfix 1187884" } ] } } ] }, "vendor_name": "McAfee" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Maliciously misconfigured registry vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10193", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10193" }, { "name": "97958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97958" } ] }, "source": { "advisory": "SB10193", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2017-4028", "datePublished": "2018-04-03T22:00:00Z", "dateReserved": "2016-12-26T00:00:00", "dateUpdated": "2024-09-17T01:25:40.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-7298
Vulnerability from cvelistv5
Published
2020-08-05 20:55
Modified
2024-08-04 09:25
Severity ?
EPSS score ?
Summary
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
McAfee | McAfee Total Protection (MTP) |
Version: unspecified < 16.0.R26 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:25:48.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "McAfee Total Protection (MTP)", "vendor": "McAfee", "versions": [ { "lessThan": "16.0.R26", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Unexpected behavior violation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-05T20:55:14", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062" } ], "source": { "advisory": "TS103062", "discovery": "EXTERNAL" }, "title": "Total Protection (MTP) - Unexpected behavior violation", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2020-7298", "STATE": "PUBLIC", "TITLE": "Total Protection (MTP) - Unexpected behavior violation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Total Protection (MTP)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "16.0.R26" } ] } } ] }, "vendor_name": "McAfee" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unexpected behavior violation" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062" } ] }, "source": { "advisory": "TS103062", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2020-7298", "datePublished": "2020-08-05T20:55:14", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-08-04T09:25:48.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-23877
Vulnerability from cvelistv5
Published
2021-10-26 21:40
Modified
2024-08-03 19:14
Severity ?
EPSS score ?
Summary
Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP.
References
▼ | URL | Tags |
---|---|---|
https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103215 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
McAfee | McAfee Total Protection (MTP) |
Version: unspecified < 16.0.34 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:14:09.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103215" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "McAfee Total Protection (MTP)", "vendor": "McAfee", "versions": [ { "lessThan": "16.0.34", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-26T21:40:08", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103215" } ], "source": { "advisory": "TS103215", "discovery": "INTERNAL" }, "title": "McAfee Total Protection (MTP) - Privilege Escalation vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2021-23877", "STATE": "PUBLIC", "TITLE": "McAfee Total Protection (MTP) - Privilege Escalation vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "McAfee Total Protection (MTP)", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "16.0.34" } ] } } ] }, "vendor_name": "McAfee" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103215", "refsource": "MISC", "url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103215" } ] }, "source": { "advisory": "TS103215", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2021-23877", "datePublished": "2021-10-26T21:40:08", "dateReserved": "2021-01-12T00:00:00", "dateUpdated": "2024-08-03T19:14:09.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }