{"vuid":"VU#324929","idnumber":"324929","name":"McAfee VirusScan Enterprise heap buffer overflow vulnerability","keywords":["McAfee","VirusScan Enterprise","On-Access Scanner","buffer overflow","multi-byte file names","characters"],"overview":"The McAfee VirusScan program contains a buffer overflow vulnerability. If exploited, this vulnerability may allow an attacker to arbitrary execute code.","clean_desc":"McAfee VirusScan Enterprise includes an anti-virus, firewall, and host-based intrusion protection system. The on-demand virus scanner component of McAfee VirusScan Enterprise contains a heap buffer overflow vulnerability. This vulnerability occurs because the scanner fails to properly process  files with long file names that contain multi-byte characters. Note that per McAfee Security Bulletin 612750: In order for this attack to work, the target computer must have East Asia language files installed, and the default Unicode codepage must be set to a language which contains multi-byte characters--such as Chinese.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges or create a denial-of-service condition.","resolution":"Update\nMcAfee has released VirusScan Enterprise 8.0i patch 12 to address this issue. See McAfee Security Bulletin 612750 for instructions on how to install this update directly or through McAfee's ePolicy Orchestrator.","workarounds":"","sysaffected":"","thanks":"Thanks it iDefense labs and McAfee for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["https://knowledge.mcafee.com/SupportSite/dynamickc.do?externalId=612750&command=show&forward=nonthreadedKC","http://www.mcafee.com/us/enterprise/products/anti_virus/file_servers_desktops/virusscan_enterprise_80i.html","http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=515","http://secunia.com/advisories/24914/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-04-18T14:44:45Z","publicdate":"2007-04-17T00:00:00Z","datefirstpublished":"2007-04-21T10:41:08Z","dateupdated":"2007-04-21T11:05:55Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"4","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"8","cam_impact":"17","cam_easeofexploitation":"16","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.16","cam_scorecurrentwidelyknown":"9.792","cam_scorecurrentwidelyknownexploited":"17.952","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.16,"vulnote":null}