FramePkg
  • Home
  • About
  • Procedures
    • ePO Upgrade
    • ePO Architecture
    • BackUp ePO
    • How To Uninstall McAfee Client Manually
    • McAfee Drive Encryption
    • TIE Guide - A to Z Steps
  • ePO
  • VSE
  • DLP
  • HIPS
  • Solutions
  • Tips
  • Videos
  • Online Updates

be
​updated!

Patches Resolve ePO 5.x Vulnerabilities

2/2/2017

0 Comments

 
Five vulnerabilities in EPO have been discovered and resolved.

AFFECTED SOFTWARE
  • EPO 5.1.3 and earlier
  • EPO 5.3.2 and earlier
REMEDIATED/PATCHED VERSIONS
The vulnerability is remediated in the following versions:
  • ePolicy Orchestrator 5.x with Hotfix 1178101
IMPACT
  • CVE-2016-5546 (CVSS: 7.5; Severity: High)
    Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data.
  • CVE-2016-5547 (CVSS: 5.3; Severity: Medium)
    Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE.
  • CVE-2016-5552 (CVSS: 5.3; Severity: Medium)
    Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, accessible data.
  • CVE-2016-2183 (CVSS: 3.1; Severity: Low)
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
  • CVE-2017-3252 (CVSS: 5.8; Severity: Medium)
    Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data
RECOMMENDATION
Intel Security recommends that all customers verify that they have applied the latest updates. Impacted users should install the relevant patches or hotfixes. For full instructions and information, see Knowledge Base article SB10186: Intel Security - Security Bulletin: Intel Security ePO update fixes multiple Oracle Java vulnerabilities. (https://kc.mcafee.com/corporate/index?page=content&id=SB10186)
0 Comments



Leave a Reply.

    Picture
    Action Coin

    Archives

    December 2017
    September 2017
    August 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016

    Categories

    All

    Ebates Coupons and Cash Back