McAfee Says It Unwittingly Fixed Software Loophole

 
 
By Chris Preimesberger  |  Posted 2006-07-14
 
 
 

Software security provider McAfee revealed July 14 that it fixed a serious flaw in its enterprise security package Common Management Agent in January 2006 with a regular update (v3.5.5) and didnt even realize it.

Common Management Agent is McAfees flagship technology for managing protective software in large organizations.

John Viega, McAfees chief security architect, told eWEEK that a successful exploit of the security flaw would allow an attacker to place arbitrary files on the machine running the indicated software.

The flaw also could let a hacker seize control of a computer and steal data or delete files, Viega said.

"When the problem existed, a hacker could basically use an agent on the same network to write to virtually any kind of file he wanted, even full applications, like Microsoft Word," Viega said. "Someone could have replaced a file with a Trojan horse, for example."

However, Viega said, no customers reported any problems, and the problem went unknown until the week of July 3, when a consultancy, eEye Digital Security in Aliso Viejo, Calif., called McAfee to report what it had found in the older software, Viega said.

eEye Digital Security decided to post an advisory on its finding July 13, Viega said, and so McAfee, based in Santa Clara, Calif., followed with its revelation July 14.

"The flaw only affected the client side of the application, not the server side," Viega told eWEEK.

McAfees engineering team had inadvertently closed the vulnerability loophole in January 2006 when his team released one of its regular program updates, Common Management Agent Update 3.5.5.

McAfee makes upgrades to appliances and online testing tools. Click here to read more.

The new version included new code for a component called EPO (e-Policy Orchestrator), which is the remote security management software for the McAfee enterprise product suite.

EPO allows security managers to configure and enforce protection policies, deploy and configure agents and monitor security status from a centralized console.

It is used in tens of thousands of computers in large companies and government agencies.

McAfee issued an apology and urged customers immediately to install updated versions of its software.

When McAfee released the update in January, it positioned it as an enhancement, not a critical fix, since the company wasnt aware of the flaw at that time.

Since many companies wont update software unless necessary, the concern is that many computers were left vulnerable.

Viega said that no consumer versions of its software were affected.

Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

Rocket Fuel