![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.808082 |
Categoría: | Denial of Service |
Título: | McAfee LiveSafe Denial of Service Vulnerability |
Resumen: | McAfee LiveSafe is prone to a denial of service (DoS) vulnerability. |
Descripción: | Summary: McAfee LiveSafe is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: The flaw exists due to the integer signedness error in the AV engine before DAT 8145. Vulnerability Impact: Successful exploitation will allow remote attackers to cause a denial of service (memory corruption and crash). Affected Software/OS: McAfee LiveSafe Version 14.0.x. Solution: As a workaround it is recommended to consider one of the following actions, if applicable: - Block the network access to the host at the relevant port, by adding an access rule to the appropriate firewall(s). - Remove or shutdown the service/product, in case it is not needed. - Shield the vulnerability by enabling an IPS signature, if available. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-4535 https://www.exploit-db.com/exploits/39770/ http://packetstormsecurity.com/files/136907/McAfee-Relocation-Processing-Memory-Corruption.html https://bugs.chromium.org/p/project-zero/issues/detail?id=817 |
Copyright | Copyright (C) 2016 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |