Files
CVEs-PoC/2018/CVE-2018-6674.md
T
2024-06-18 02:51:15 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2018-6674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6674)
![](https://img.shields.io/static/v1?label=Product&message=%20VirusScan%20Enterprise%20(VSE)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8.8%3C%208.8%20Patch%2013%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Data%20Leakage%20via%20Privilege%20Escalation%20(CWE-269)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Permissions%2C%20Privileges%2C%20and%20Access%20Control%20(CWE-264)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Privilege%20Escalation%20(CWE-274)&color=brighgreen)
### Description
Privilege Escalation vulnerability in Microsoft Windows client (McTray.exe) in McAfee VirusScan Enterprise (VSE) 8.8 prior to Patch 13 allows local users to spawn unrelated processes with elevated privileges via the system administrator granting McTray.exe elevated privileges (by default it runs with the current user's privileges).
### POC
#### Reference
- https://kc.mcafee.com/corporate/index?page=content&id=SB10237
#### Github
No PoCs found on GitHub currently.