CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
5.1%
The version of Trellix Agent, formerly McAfee Agent or McAfee Policy Orchestrator (ePO) Agent, installed on the remote host is prior to 5.8.1. It is, therefore, affected by a buffer overflow vulnerability due to not handling files in the /var/McAfeee/.msgbus folder correctly. A local attacker can exploit this vulnerability to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root.
This may also result in the disabling of event reporting to ePO.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(187944);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/01/15");
script_cve_id("CVE-2024-0213");
script_xref(name:"IAVA", value:"2024-A-0010");
script_name(english:"Trellix Agent < 5.8.1 Buffer Overflow Vulnerability (SB10416)");
script_set_attribute(attribute:"synopsis", value:
"A security management agent installed on the remote host is affected by a buffer overflow vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of Trellix Agent, formerly McAfee Agent or McAfee Policy Orchestrator (ePO) Agent, installed on the remote
host is prior to 5.8.1. It is, therefore, affected by a buffer overflow vulnerability due to not handling files in the
/var/McAfeee/.msgbus folder correctly. A local attacker can exploit this vulnerability to gain elevated permissions, or
cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root.
This may also result in the disabling of event reporting to ePO.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://kcm.trellix.com/corporate/index?page=content&id=SB10416");
script_set_attribute(attribute:"solution", value:
"Upgrade to McAfee Agent version 5.8.1 or later.");
script_set_attribute(attribute:"agent", value:"unix");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-0213");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/01/09");
script_set_attribute(attribute:"patch_publication_date", value:"2024/01/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/01/11");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:epolicy_orchestrator_agent");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mcafee:agent");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mcafee_epo_agent_installed_nix.nbin");
script_require_keys("installed_sw/McAfee ePO Agent");
exit(0);
}
include('vcf.inc');
# Non-Windows only
if (get_kb_item('SMB/Registry/Enumerated')) audit(AUDIT_OS_NOT, 'affected');
var app_info = vcf::get_app_info(app:'McAfee ePO Agent');
vcf::check_granularity(app_info:app_info, sig_segments:3);
# Exact Build Numbers if needed:
var constraints = [{'fixed_version': '5.8.1'}];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);