McAfee Security Bulletin: Application Control update fixes a privilege escalation vulnerability (CVE-2016-8009)
Security Bulletins ID:
SB10175
Last Modified: 9/23/2020
Last Modified: 9/23/2020
Summary
First Published: November 22, 2016
Recent updates to this article
Recent updates to this article
| Date | Update |
| September 23, 2020 | Updated Release Notes links. |
| Impact of Vulnerability: | Privilege Escalation (CWE-274) |
| CVE Numbers: | CVE-2016-8009 |
| Severity Rating: | Medium |
| Base / Overall CVSS v3 Scores: | 7.5 / 7.0 |
| Recommendations: | Apply McAfee Application Control (MAC) 6.2.0 Hotfix 14 Upgrade to MAC 7.0.1 or later |
| Security Bulletin Replacement: | None |
| Affected Software: | MAC 7.0.0 and MAC 6.x |
| Location of Updated Software: | http://www.mcafee.com/us/downloads/downloads.aspx |
Pour recevoir une notification par e-mail lorsque cet article est mis à jour, cliquez sur S'inscrire sur la droite de la page. Vous devez être connecté pour vous inscrire.
Article contents:
Description
MAC 7.0.0 and MAC 6.x allow an unauthorized use of IOCTL, which may result in a local privilege escalation, DoS, unexpected behavior, or potentially unauthorized code execution.
CVE-2016-8009
Privilege escalation vulnerability in McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8009
CVE-2016-8009
Privilege escalation vulnerability in McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8009
Affected Component:
- McAfee Application Control
Remediation
Go to the Product Downloads site and download the applicable product update/hotfix files:
| Product | Type | Version | File Name | Release Date |
| McAfee Application Control 6.2.0 | Hotfix | 6.2.0–567 | SOLIDCOR620-567_WIN.zip | November 11, 2016 |
| McAfee Application Control 7.0.1 | GA | 7.0.1-275 | SOLIDCOR701-275_WIN.zip | October 14, 2016 |
GA=Generally Available
For more information, review the following release notes:
See KB56057 for instructions on how to download McAfee products, documentation, security updates, patches, and hotfixes. Review the Release Notes and the Installation Guide, which you can download from the Documentation tab, for instructions on how to install these updates.
For more information, review the following release notes:
- Change Control and Application Control 6.2.0 Hotfix 14 Release Notes
- Application Control 7.0.1 Release Notes
See KB56057 for instructions on how to download McAfee products, documentation, security updates, patches, and hotfixes. Review the Release Notes and the Installation Guide, which you can download from the Documentation tab, for instructions on how to install these updates.
Acknowledgements
Frequently Asked Questions (FAQs)
How do I know whether my McAfee product is vulnerable or not?
For Endpoint products:
Use the following instructions for endpoint or client based products:What is CVSS?
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/.
When calculating CVSS scores, McAfee has adopted a philosophy that fosters consistency and repeatability. Our guiding principle for CVSS scoring is to score the exploit under consideration by itself. We consider only the immediate and direct impact of the exploit under consideration. We do not factor into a score any potential follow-on exploits that might be made possible by successful exploitation of the issue being scored
What are the CVSS scoring metrics that have been used?
CVE-2016-8009 - Privilege Escalation Vulnerability
NOTE: The below CVSS version 3.0 vector was used to generate this score.
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:L/MPR:L/MUI:R/MS:C/MC:H/MI:H/MA:H
Where can I find a list of all security bulletins or how do I report a product vulnerability?
To find a list of all security bulletins, or if you have information about a security issue or vulnerability with a McAfee product, please visit our product security website at: http://www.mcafee.com/us/threat-center/product-security-bulletins.aspx.
For Endpoint products:
Use the following instructions for endpoint or client based products:
- Right-click on the McAfee tray shield icon on the Windows task bar.
- Select Open Console.
- In the console, select Action Menu.
- In the Action Menu, select Product Details. The product version is displayed.
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/.
When calculating CVSS scores, McAfee has adopted a philosophy that fosters consistency and repeatability. Our guiding principle for CVSS scoring is to score the exploit under consideration by itself. We consider only the immediate and direct impact of the exploit under consideration. We do not factor into a score any potential follow-on exploits that might be made possible by successful exploitation of the issue being scored
| Base Score | 7.5 |
| Attack Vector (AV) | Local (L) |
| Attack Complexity (AC) | High (H) |
| Privileges Required (PR) | Low (L) |
| User Interaction (UI) | Required (R) |
| Scope (S) | Changed (C) |
| Confidentiality (C) | High (H) |
| Integrity (I) | High (H) |
| Availability (A) | High (H) |
| Temporal Score (Overall) | 7.0 |
| Exploitability (E) | Functional (F) |
| Remediation Level (RL) | Official Fix (O) |
| Report Confidence (RC) | Confirmed (C) |
NOTE: The below CVSS version 3.0 vector was used to generate this score.
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:L/MPR:L/MUI:R/MS:C/MC:H/MI:H/MA:H
Where can I find a list of all security bulletins or how do I report a product vulnerability?
To find a list of all security bulletins, or if you have information about a security issue or vulnerability with a McAfee product, please visit our product security website at: http://www.mcafee.com/us/threat-center/product-security-bulletins.aspx.
Resources
Pour contacter le Support technique, connectez-vous au portail ServicePortal et allez sur la page Création d'une demande de service à l'adresse https://support.mcafee.com/ServicePortal/faces/serviceRequests/createSR :
- Si vous êtes un utilisateur enregistré, saisissez votre Nom d'utilisateur et votre Mot de passe, puis cliquez sur Se connecter.
- Si vous n'êtes pas enregistré, cliquez sur S'enregistrer et remplissez les champs requis. Votre mot de passe et vos instructions de connexion vous seront adressés par e-mail.
Disclaimer
The information provided in this security bulletin is provided as is without warranty of any kind. McAfee disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall McAfee or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits, or special damages, even if McAfee or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Any future product release dates mentioned in this security bulletin are intended to outline our general product direction and they should not be relied on in making a purchasing decision. The product release dates are for information purposes only, and may not be incorporated into any contract. The product release dates are not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion and may be changed or cancelled at any time.

