Mcafee Securitycenter "mcinsctl.dll" Activex File Overwrite Vuln


Recommended Posts

Story published by Secunia

Source: Peter Vreugdenhil

Peter Vreugdenhil has reported a vulnerability in McAfee SecurityCenter, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to an error in restricting the browser domain in which the "mcinsctl.dll" ActiveX control can be instantiated. The control contains the "MCINSTALL.McLog" object that can be used to write to a log file. This can be exploited to create or append to arbitrary files, potentially allowing arbitrary code execution by creating files in the user's startup folder.

Successful exploitation requires that the user is e.g. tricked into visiting a malicious website.

The vulnerability has been reported in "mcinsctl.dll" version 4.0.0.83 that is included with McAfee VirusScan. Other products that contain the vulnerability ActiveX control may also be affected.

Solution:

The vulnerability has reportedly been fixed via automatic update.

Secunia Advisory

Link to post
Share on other sites

"The vulnerability has reportedly been fixed via automatic update"

Ah, music to my ears!! (and my son hates the auto updates, perfect reason why I LOVE them!)

Thank you, Brandon

Liz

Edited by blim
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...