Check Point Advisories

McAfee ePolicy Orchestrator Agent HTTP POST Handling Flaw (CVE-2004-0095)

Check Point Reference: CPAI-2004-109
Date Published: 18 Apr 2010
Severity: High
Last Updated: Sunday 18 April, 2010
Source:
Industry Reference:CVE-2004-0095
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description McAfee Corporation is a major vendor of numerous anti-virus, network, and desktop security products which are deployed in consumer as well as enterprise environments. McAfee ePolicy Orchestrator is a central security management system to manage security policy, assess and enforce policy, notify user, etc. There exists a vulnerability in McAfee ePolicy Orchestrator client component. The vulnerability is caused due to an improper handling of Content-Length values in POST HTTP requests, that may cause a denial of service condition. In the case of an attack, the target will no longer accept connections on port TCP/8081. The connection over which the attack occurred will remain open until closed by the attacker.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the McAfee ePolicy Orchestrator Agent HTTP POST Handling Flaw protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Security Products Enforcement Violation.
Attack Information:  McAfee ePolicy Orchestrator agent HTTP POST handling flaw

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK