Remote Code Execution in McAfee SaaS Endpoint Protection via ActiveX Control
CVE-2011-3007
Currently unrated
Summary
The myCIOScn ActiveX control (myCIOScn.dll) in McAfee SaaS Endpoint Protection versions 5.2.1 and earlier is susceptible to a vulnerability that allows remote attackers to write to arbitrary files. By manipulating the MyCioScan.Scan.ReportFile parameter, an attacker can specify malicious filenames, leading to injection of harmful scripts into log files. This can ultimately enable execution of arbitrary code through the MyCioScan.Scan.Start method, posing a serious risk to user systems.
References
Timeline
Vulnerability published
Vulnerability Reserved