TippingPoint Zero Day Initiative
 

McAfee SmartFilter Administration Server SFAdminSrv.exe JBoss RMI Remote Code Execution Vulnerabilty

ZDI-12-140: August 17th, 2012

CVSS Score

Affected Vendors

    McAfee

Affected Products

    Smart Filter

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee SmartFilter Administration Server. Authentication is not required to exploit this vulnerability.

The flaw exists within the Remote Method Invocation (RMI) component which is exposed by SFAdminSrv.exe process. This process exposes various RMI services to TCP ports 4444 (JBoss RMI HTTPInvoker), 1098 (rmiactivation), 1099 (rmiregistry). Requests to these services are not authenticated and can be used to instantiate arbitrary classes or to upload and execute arbitrary archives. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

Vendor Response

McAfee has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-11-21 - Vulnerability reported to vendor
    2012-08-17 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    Andrea Micalizzi aka rgod