Vulnerability CVE-2016-9892


Published: 2017-03-02   Modified: 2017-03-03

Description:
The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate. NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root.

See advisories in our WLB2 database:
Topic
Author
Date
High
ESET Endpoint Antivirus 6 Remote Code Execution
Google Security ...
28.02.2017
Med.
F-Secure AV Man-In-The-Middle
Martin Kolarik
11.03.2017

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
ESET -> Endpoint security 
ESET -> Endpoint antivirus 

 References:
http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
http://seclists.org/fulldisclosure/2017/Feb/68
http://support.eset.com/ca6333/
http://www.securityfocus.com/bid/96462

Copyright 2024, cxsecurity.com

 

Back to Top