|Check Point Reference:||CPAI-2015-0298|
|Date Published:||26 Mar 2015|
|Last Updated:||26 Mar 2015|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||The McAfee Security Center application is meant to allow users to set preferences and settings for numerous installed McAfee components and services, such as the anti-virus component VirusScan, the Personal Firewall Plus, the Privacy Service, or the SpamKiller component. The Security Control Center is capable of manually, or automatically downloading and updating McAfee products. This functionality is implemented by way of an ActiveX control installed with the Security Control Center, the McAfee Installer Control, in the dynamically linked library (DLL) mcinsctl.dll. A single DLL can contain any number of ActiveX Controls, the McAfee Installer Control DLL exports two controls, one for installing and updating software, the McInstaller, and one for creating log files, the McLog. A vulnerability exists in the McAfee Security Center product. The flaw is caused by a lack of implementation of domain-based access restrictions on the McLog ActiveX control provided by the affected product. A remote attacker may exploit this vulnerability via a specially crafted Web page to write arbitrary files on the target system. After successfully exploiting this vulnerability, a file on the target file system might be created, modified, or overwritten. An attacker may write a file to a startup folder in order to execute arbitrary code during the next reboot or logon session or overwrite credential files on the system in order to gain access to the system. Thus, the behaviour of the target depends on the intention of the attacker.|
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Web Client Enforcement Violation.
Attack Information: McAfee Security Center MCINSCTL.DLL ActiveX Control File Overwrite - Ver2