> TITLE:
> McAfee ePolicy Orchestrator / ProtectionPilot Source Header Buffer
> Overflow
>
> SECUNIA ADVISORY ID:
> SA22222
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/22222/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> System access
>
> WHERE:
> From local network
>
> SOFTWARE:
> McAfee ProtectionPilot 1.x
> http://secunia.com/product/5538/
> McAfee ePolicy Orchestrator 3.x
> http://secunia.com/product/1943/
>
> DESCRIPTION:
> A vulnerability has been reported in McAfee ProtectionPilot and
> McAfee ePolicy Orchestrator, which can be exploited by malicious
> people to compromise a vulnerable system.
>
> The vulnerability is caused due to a boundary error within the
> handling of long source headers. This can be exploited to cause a
> buffer overflow and potentially allows to execute arbitrary code by
> sending a specially crafted request to a vulnerable system.
>
> The vulnerability has been reported in McAfee ProtectionPilot 1.1.0
> and McAfee ePolicy Orchestrator 3.5.0. Other versions may also be
> affected.
>
> SOLUTION:
> Apply patches.
>
> McAfee ProtectionPilot:
> http://download.nai.com/products/patches/protectionpilot/v1.1.
> 1/PRP1113.zip
>
> McAfee ePolicy Orchestrator:
> http://download.nai.com/products/patches/ePO/v3.5/EPO3506.zip
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Mati Aharoni and Moti Joseph.
>
> ORIGINAL ADVISORY:
> http://download.nai.com/products/patches/protectionpilot/v1.1.
> 1/PRP1113.txt
> http://download.nai.com/products/patches/ePO/v3.5/EPO3506.txt
>