McAfee SmartFilter Administration Server SFAdminSrv.exe JBoss RMI Remote Code Execution VulnerabiltyZDI-12-140: August 17th, 2012
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee SmartFilter Administration Server. Authentication is not required to exploit this vulnerability.
The flaw exists within the Remote Method Invocation (RMI) component which is exposed by SFAdminSrv.exe process. This process exposes various RMI services to TCP ports 4444 (JBoss RMI HTTPInvoker), 1098 (rmiactivation), 1099 (rmiregistry). Requests to these services are not authenticated and can be used to instantiate arbitrary classes or to upload and execute arbitrary archives. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
Vendor ResponseMcAfee has issued an update to correct this vulnerability. More details can be found at:
2011-11-21 - Vulnerability reported to vendor
2012-08-17 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Andrea Micalizzi aka rgod