McAfee VirusScan Enterprise for Linux Security Flaws Gives Attackers Root Access

Advertisement
By Sanket Vijayasarathy | Updated: 13 December 2016 17:36 IST

McAfee has patched 10 critical vulnerabilities in its VirusScan Enterprise for Linux, reportedly six months after they were disclosed. According to security researcher Andrew Fasano from MIT Lincoln Laboratory, the vulnerabilities when chained could result in the execution of the code remotely as a root user.

"At a first glance, Intel's McAfee VirusScan Enterprise for Linux has all the best characteristics that vulnerability researchers love: it runs as root, it claims to make your machine more secure, it's not particularly popular, and it looks like it hasn't been updated in a long time," the security advisory reads. "When I noticed all these, I decided to take a look."

Fasano said that attackers could chain the flaws to compromise VirusScan Enterprise for Linux by running malicious update servers. The malicious script after chaining the vulnerabilities is then run by the root user on the victim machine.

Advertisement

The vulnerabilities have been found present from at least version 1.9.2 through version 2.0.2, which was released in April 2016.

Advertisement

Fasano originally reported the vulnerabilities in June through the US computer emergency response team clearing house which passed on the information to McAfee. The security company in return asked for a six month non-disclosure extension until December. The company made no contact after July and was informed on December 5 that the report would be published on December 12.

McAfee on December 9 published the reports of the vulnerabilities, four days ahead of Fasano's report.

Advertisement

Fasano detailed the process which requires four of the 10 vulnerabilities to complete the exploit. The first pair, CVE-2016-8016 and CVE-2016-8017 allows an authentication token to be brute-forced and used to connect with McAfee Linux clients.

The attackers then use another flaw CVE-2016-8021 to force the target to create a malicious script. A request is then sent to authenticate the start of virus scan but which will execute the malicious script instead using CVE-2016-8020 and CVE-2016-8021. With these flaws combined, the attackers malicious script is run as root on the victim's machine.

Advertisement

In addition to this, Fasano found six more bugs which include an authenticated SQL injection, CVE-2016-8025, HTTP response splitting (CVE-2016-8024), cross-site scripting (CVE-2016-8019), cross-site request forgery tokens (CVE-2016-8018) and a remote unauthenticated file read and existence test (CVE-2016-8016, CVE-2016-8017).

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. iOS 26.1 Beta 4 Lets You Tone Down Apple's Liquid Glass Design
  1. iQOO 15 Launched With Snapdragon 8 Elite Gen 5, Three 50-Megapixel Rear Cameras: Price, Specifications
  2. Meta AI App Has Reportedly Gained Popularity With the Vibes Features
  3. iQOO Pad 5e With Snapdragon 8 Gen 3 Chip Launched Alongside iQOO Watch GT 2 and iQOO TWS 5
  4. Apple's iOS 26.1 Beta 4 Adds an Option to Tone Down Liquid Glass Transparency
  5. NASA Experiment Shows Martian Ice Could Preserve Signs of Ancient Life
  6. MIT Detects Traces of a Lost ‘Proto Earth’ Deep Beneath Our Planet’s Surface
  7. Astronomers Detect Heavy Water in Planet-Forming Disk Around Young Star
  8. Global Projects Aim to Save Sinking Cities From Rising Seas and Climate Change
  9. NASA Confirms Brightening Comet SWAN Could Be Visible With Binoculars: When and Where to See It
  10. We Live in Time OTT Release: When, Where to Watch the Andrew Garfield and Florence Pugh Romance
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.