Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> Visnetic AntiVirus Plug-in for MailServer Local Privilege Escalation Vulnerability


Vulnerability Assessment Details

Visnetic AntiVirus Plug-in for MailServer Local Privilege Escalation Vulnerability

Vulnerability Assessment Summary
Checks version of Visnetic AntiVirus Plug-in for MailServer

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows application is prone to a local privilege
escalation issue.

Description :

The version of VisNetic AntiVirus Plug-in for MailServer installed on
the remote host does not drop its rights before invoking other
programs. A possible hacker with local access can exploit this flaw to
execute arbitrary programs on the affected host with LOCAL SYSTEM
rights.

See also :

http://secunia.com/secunia_research/2005-65/advisory/

Solution :

Upgrade to VisNetic AntiVirus Plug-in for VisNetic MailServer version
4.6.1.2 or later.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:L/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 16788

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Seagate Barracuda ST31000528AS 1TB
$43.99
Seagate Barracuda ST31000528AS 1TB pictureLenovo Ideapad 330-17IKB - 17.3" - Core i3 8130U - 6 GB RAM - 1 TB
$199.99
Lenovo Ideapad 330-17IKB - 17.3Lenovo Edge 2 1580 15.6" FHD TouchScreen i5-6200U 2.3GHz 8GB 1TB W10 2in1 Laptop
$399.99
Lenovo Edge 2 1580 15.6WD Blue SATA 2.5" 1TB WD10JPVX-22JC3T0 Hard Drive
$29.9
WD Blue SATA 2.5


Discussions

No Discussions have been posted on this vulnerability.