Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.
References
Link | Resource |
---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10369 | Broken Link |
https://www.zerodayinitiative.com/advisories/ZDI-21-1104/ | Third Party Advisory VDB Entry |
Configurations
History
29 Sep 2021, 16:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1104/ - Third Party Advisory, VDB Entry | |
References | (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10369 - Patch, Vendor Advisory | |
CPE | cpe:2.3:a:mcafee:mcafee_agent:*:*:*:*:*:windows:*:* |
22 Sep 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Sep 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-22 14:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-31847
Mitre link : CVE-2021-31847
CVE.ORG link : CVE-2021-31847
JSON object : View
Products Affected
mcafee
- agent