Loading...

Knowledge Center


McAfee Security Bulletin - DLPe ePO extension update fixes several vulnerabilities: XSS, SQL Injection, and Improper Access Control
Security Bulletins ID:   SB10098
Last Modified:  6/5/2017
Rated:


Summary

 Who Should Read This Document:  Technical and Security Personnel
 Impact of Vulnerability:  Cross-Site Scripting (XSS) (CWE-79)
 SQL Injection (CWE-89)
 Improper Access Control (CWE-287)
 CVE Numbers:  CVE-2015-1616
 CVE-2015-1617
 CVE-2015-1618
 CERT/CC and Other Numbers:  None
 Severity Rating:  Medium
 Base / Overall CVSS Scores:  6.6 / 5.2
 6.6 / 5.2
 3.5 / 2.7
 Recommendations:  Install or update to DLPe 9.3 Patch 4 (9.3.400)
 Security Bulletin Replacement:  None
 Caveats:  Same patch resolves issues in SB10097
 Affected Software:  DLP Endpoint (DLPe) 9.3.300 and earlier
 Location of Updated Software:  http://www.mcafee.com/us/downloads/downloads.aspx

To receive email notification when this article is updated, click Subscribe on the right side of the page. You must be logged in to subscribe.

Article contents:

Description

The DLP Endpoint ePO extension is vulnerable to three exploits:
 
#1 Cross-Site Scripting (XSS)
A malicious user is capable of injecting arbitrary browser script content into a user’s browsing session through Cross Site Scripting. Injected content may contain malicious JavaScript designed to exploit or harm a user’s browser.
 
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
http://cwe.mitre.org/data/definitions/79.html
 
CVE-2015-1617
Cross-site scripting (XSS) vulnerability in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
http://cxsecurity.com/cveshow/CVE-2015-1617/
 
#2 SQL Injection
A SQL Injection vulnerability can be exploited by all authenticated ePO users to manipulate the ePO database.
 
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
http://cwe.mitre.org/data/definitions/89.html
 
CVE-2015-1616
SQL injection vulnerability in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated ePO users to execute arbitrary SQL commands via unspecified vectors.
http://cxsecurity.com/cveshow/CVE-2015-1616/
 
#3 Improper Access Control
A specially crafted URL may be used to retrieve sensitive password information from the ePO database.
 
CWE-287
Improper Authentication
http://cwe.mitre.org/data/definitions/287.html
 
CVE-2015-1618
The ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated users to obtain sensitive password information via a crafted URL.
http://cxsecurity.com/cveshow/CVE-2015-1618/
 
Affected Components:
  • DLPe ePO extension 9.3.300 and earlier.
This issue is resolved in McAfee DLPe version 9.3 Patch 4 released on January 20, 2015.

Remediation

Install DLPe 9.3 Patch 4 ePO extension on affected ePO servers.

Go to the McAfee Downloads site and download the applicable product patch/hotfix file:
 
Product Type Patch Version File Name Release Date
DLPe 9.3 Patch 4 Patch 9.3.400   January 20, 2015
 
Additional Patch/Hotfix Information:
This patch needs to be applied only to systems running the DLPe ePO extension.
 
McAfee Product Download Instructions
  1. Launch Internet Explorer.
  2. Navigate to: http://www.mcafee.com/us/downloads/downloads.aspx.
  3. Provide your valid McAfee Grant Number.
  4. Click your product suite.
  5. Click the applicable product (see table above) and click I Agree.
  6. Click the Patches tab and click the link to download the product .ZIP file under the Product column.
For instructions on how to download McAfee products, documentation, security updates, patches, or hotfixes, see: KB56057.

For instructions on how to install/upgrade this hotfix/patch, please review the Release Notes and the Installation Guide (which you can download from the Documentation tab) following the same steps above.

Workaround

None. Install the provided patch.

Mitigations
None.

Acknowledgements

McAfee credits François-Xavier Stellamans from the NCI Agency – Cyber Security (NATO) for reporting this flaw.

Support

Corporate Technical Support:
1-800-338-8754
http://www.mcafee.com/us/about/contact-us.aspx#ht=tab-techsupport 

Frequently Asked Questions (FAQs)

What is affected by this security vulnerability?
McAfee DLPe ePO extension is affected.

Affected Versions:

 

  • 9.3.300 and earlier
Protected Versions:
  • 9.3.400 and later
McAfee recommends that all customers verify that they have applied the latest updates.

What issue does this hotfix/patch address?
Cross Site Scripting, SQL Injection, and Improper Access Control vulnerabilities.

Does this vulnerability affect McAfee enterprise products?
Yes, DLPe 9.3 is an enterprise product.

How do I know if my McAfee product is vulnerable or not?
For DLPe ePO Extension:
Use the following instructions:
  1. Log on to ePO server.
  2. Click Menu, Data Protection, DLP Policy.
  3. Inside the DLP console click the Help menu item, About. The product version is displayed.
What is CVSS?
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/.

What are the CVSS scoring metrics that have been used?

#1 Cross-Site Scripting (XSS)

 

 Base Score 6.6
 Related exploit range (AccessVector) Network
 Attack complexity (AccessComplexity) High
 Level of authentication needed (Authentication) Single
 Confidentiality impact Complete
 Integrity impact Complete
 Availability impact None
 Temporal Score (Overall) 5.2
 Availability of exploit (Exploitability) Proof of concept code
 Type of fix available (RemediationLevel) Official fix
 Level of verification that vulnerability exists (ReportConfidence) Confirmed

NOTE: CVSS version 2.0 was used to generate this score.
http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:H/Au:S/C:C/I:C/A:N/E:POC/RL:OF/RC:C)

#2 SQL Injection

 

 Base Score 6.6
 Related exploit range (AccessVector) Network
 Attack complexity (AccessComplexity) High
 Level of authentication needed (Authentication) Single
 Confidentiality impact Complete
 Integrity impact Complete
 Availability impact None
 Temporal Score (Overall) 5.2
 Availability of exploit (Exploitability) Proof of concept code
 Type of fix available (RemediationLevel) Official fix
 Level of verification that vulnerability exists (ReportConfidence) Confirmed

NOTE: CVSS version 2.0 was used to generate this score.
http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:H/Au:S/C:C/I:C/A:N/E:POC/RL:OF/RC:C)

#3 Improper Authentication Control

 

 Base Score 3.5
 Related exploit range (AccessVector) Network
 Attack complexity (AccessComplexity) Medium
 Level of authentication needed (Authentication) Single
 Confidentiality impact Partial
 Integrity impact None
 Availability impact None
 Temporal Score (Overall) 2.7
 Availability of exploit (Exploitability) Proof of concept code
 Type of fix available (RemediationLevel) Official fix
 Level of verification that vulnerability exists (ReportConfidence) Confirmed

NOTE: CVSS version 2.0 was used to generate this score.
http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:M/Au:S/C:P/I:N/A:N/E:POC/RL:OF/RC:C)

What has McAfee done to resolve the issue?
McAfee released a patch to address this security flaw on January 20, 2015.

Where do I download the fix?
You can download the fix from: http://www.mcafee.com/us/downloads/downloads.aspx.
Users will need to provide their McAfee Grant Number to initiate the download.

How does McAfee respond to this and any other security flaws?
McAfee’s key priority is the security of our customers. In the event that a vulnerability is found within any of McAfee’s software, we work closely with the relevant security research group to ensure rapid and effective development of a fix and communication plan.

McAfee only publishes product vulnerability bulletins together with an actionable workaround, hotfix, patch, or version update; otherwise we would simply be informing the hacker community that our products are a target, putting our customers at greater risk. 

McAfee may publish lists of known vulnerable and not vulnerable products if the product vulnerability is already generally known publicly, but no actionable workaround is ready yet.
 
Where can I find a list of all Security Bulletins?
To view all published Security Bulletins, visit the McAfee ServicePortal at https://mysupport.mcafee.com, click Knowledge Center, and select Security Bulletins in the left navigation pane under Content Source. Alternatively, you can use this link: https://support.mcafee.com/ServicePortal/faces/knowledgecenter?s=true&lang=en-us&sm=false&tab=SCtdl&facets=Security+Bulletin@INQUIRA_TYPE&sb=mostViewed&sbv=numberofviews%3Anumberdecreasing&scps=q.
 
If you know the Security Bulletin ID, use the following link after replacing the example Security Bulletin ID (SB10071) with the Security Bulletin ID you are searching for: https://kc.mcafee.com/corporate/index?page=content&id=SB10071.
 
How do I report a product vulnerability?
If you have information about a security issue or vulnerability with a McAfee product, please visit our product security website at: http://www.mcafee.com/us/threat-center/product-security-bulletins.aspx#=tab-vulnerability.

Resources

For contact details: Go to http://www.mcafee.com/us/about/contact/index.html. Non-US customers - select your country from the list of Worldwide Offices.

Alternatively:
Log into the McAfee Technical Support ServicePortal at https://mysupport.mcafee.com:
  • If you are a registered user, type your User ID and Password and click Log In.
  • If you are not a registered user, click Register and complete the required fields. Your password and login instructions will be emailed to you.
To download McAfee products, updates, and documentation, visit the Downloads page at http://www.mcafee.com/us/downloads/downloads.aspx. For instructions on downloading, see KB56057.

To download new Beta software or to read about the latest Beta information, go to http://www.mcafee.com/us/downloads/beta-programs/index.aspx.

To submit Beta feedback on any McAfee product, email: mcafee_beta@mcafee.com.

For copyright, trademark attributions, and license information, go to http://us.mcafee.com/root/aboutUs.asp?id=copyright.

For patents protecting this product, see your product documentation.

Disclaimer

The information provided in this security bulletin is provided as is without warranty of any kind. McAfee disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall McAfee or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if McAfee or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Any future product release dates mentioned in this bulletin are intended to outline our general product direction and they should not be relied on in making a purchasing decision. The product release dates are for information purposes only, and may not be incorporated into any contract. The product release dates are not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion and may be changed or cancelled at any time.

Rate this document

Did this article resolve your issue?

Please provide any comments below

Languages:

This article is available in the following languages:

English United States
Japanese

Beta Translate with

Select a desired language below to translate this page.

Glossary of Technical Terms


 Highlight Glossary Terms

Please take a moment to browse our Glossary of Technical Terms.