Friday, April 24, 2020

McAfee Security Bulletin: Update fixes a potential vulnerability in McAfee AntiVirus Plus, McAfee Internet Security, and McAfee Total Protection (CVE-2017-4028)

Impact of Vulnerability:Code Injection by an attacker with Administrative privileges
CVE Numbers:CVE-2017-4028
Severity Rating:Medium
Base / Overall CVSS v3 Scores:5.0 / 4.7
Recommendations:Fixed in the latest version of McAfee AntiVirus Plus (AVP), McAfee Internet Security (MIS), and McAfee Total Protection (MTP). Existing users will be protected with DAT updates.
Security Bulletin Replacement:None
Affected Software:AVP
MIS
MTP
Location of updated software:Automatic update for the existing users
Summary

Article contents:
Description
CVE-2017-4028 – Craft a Maliciously Misconfigured Registry vulnerability in Microsoft Windows such that McAfee Total Protection (MTP), McAfee Internet Security (MIS), or McAfee AntiVirus Plus (AVP) allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of Registry parameters.

The issue was reported against Consumer Windows System security software – AVP, MIS, and MTP. This vulnerability allows an attacker with Windows Administrative privileges to change a registry value to allow malicious code to be injected into a process.

NOTE: A successful exploit is possible only after an attacker gains Administrative privileges on the system.

McAfee reminds users that individuals with Windows administrative privileges can control processes and change system settings. McAfee products provide a layered set of defenses against an attacker gaining entry to a Windows system. But, users should always log in with the least set of privileges required for the tasks to be accomplished. McAfee recommends that users log in with administrator privileges only when they must.

This fix resolves the issue with:
  • McAfee AntiVirus Plus (AVP)
  • McAfee Internet Security (MIS)
  • McAfee Total Protection (MTP)
Affected Components:
  • McAfee AntiVirus Plus (AVP)
  • McAfee Internet Security (MIS)
  • McAfee Total Protection (MTP)
Remediation
Upgrade to the latest version of:
  • McAfee AntiVirus Plus (AVP)
  • McAfee Internet Security (MIS)
  • McAfee Total Protection (MTP)
ProductTypeVersionRelease Date
McAfee AntiVirus Plus (AVP)
McAfee Internet Security (MIS)
McAfee Total Protection (MTP)
DAT Update2932.0March 28, 2017
Workaround
None. Upgrade to the latest version of AVP, MIS, and MTP.
Mitigations
The latest versions of AVP, MIS, and MTP have fixed the vulnerability. All existing users are to be updated with the latest version gradually.
Acknowledgements
None.
Frequently Asked Questions (FAQs)

What is CVSS?
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/.

When calculating CVSS scores, McAfee has adopted a philosophy that fosters consistency and repeatability. Our guiding principle for CVSS scoring is to score the exploit under consideration by itself. We consider only the immediate and direct impact of the exploit under consideration. We do not factor into a score any potential follow-on exploits that might be made possible by successful exploitation of the issue being scored.

What are the CVSS scoring metrics that have been used?

CVE-2017-4028 – Code Injection by an Administrative user in AVP, MIS, and MTP
 
 Base Score5.0
 Attack Vector (AV)Local (L)
 Attack Complexity (AC)High (H)
 Privileges Required (PR)High (H)
 User Interaction (UI)Required (R)
 Scope (S)Changed (C)
Confidentiality (C)None (N)
Integrity (I)High (H)
Availability (A)None (N)
 Temporal Score (Overall)4.7
 Exploitability (E)Functional (F)
 Remediation Level (RL)Official Fix (O)
 Report Confidence (RC)Confirmed (C)

NOTE: The below CVSS version 3.0 vector was used to generate this score.
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C


Where can I find a list of all security bulletins or how do I report a product vulnerability?
To find a list of all security bulletins, or if you have information about a security issue or vulnerability with a McAfee product, please visit our product security website at: http://www.mcafee.com/us/threat-center/product-security-bulletins.aspx.
Resources
To contact Technical Support, go to https://service.mcafee.com/ContactCustomerService.aspx?lc=1033&sg=CS&pt=1.
Disclaimer
The information provided in this security bulletin is provided as is without warranty of any kind. McAfee disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall McAfee or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if McAfee or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Any future product release dates mentioned in this security bulletin are intended to outline our general product direction and they should not be relied on in making a purchasing decision. The product release dates are for information purposes only, and may not be incorporated into any contract. The product release dates are not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion and may be changed or canceled at any time.

No comments:

Post a Comment