search menu icon-carat-right cmu-wordmark

CERT Coordination Center

McAfee VirusScan Enterprise heap buffer overflow vulnerability

Vulnerability Note VU#324929

Original Release Date: 2007-04-21 | Last Revised: 2007-04-21


The McAfee VirusScan progream contains a buffer overflow vulnerability. If exploited, this vulnerability may allow an attacker to arbitrary execute code.


McAfee VirusScan Enterprise includes an anti-virus, firewall, and host-based intrusion protection system.

The on-demand virus scanner component of McAfee VirusScan Enterprise contains a heap buffer overflow vulnerability. This vulnerability occurs because the scanner fails to properly process files with long file names that contain multi-byte characters.

Note that per McAfee Security Bulletin 612750:
In order for this attack to work, the target computer must have East Asia language files installed, and the default Unicode codepage must be set to a language which contains multi-byte characters--such as Chinese.


A remote, unauthenticated attacker may be able to execute arbitrary code with SYSTEM privileges or create a denial-of-service condition.



McAfee has released VirusScan Enterprise 8.0i patch 12 to address this issue. See McAfee Security Bulletin 612750 for instructions on how to install this update directly or through McAfee's ePolicy Orchestrator.

Vendor Information


McAfee Affected

Updated:  April 21, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


See for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks it iDefense labs and McAfee for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 8.16
Date Public: 2007-04-17
Date First Published: 2007-04-21
Date Last Updated: 2007-04-21 11:05 UTC
Document Revision: 11

Sponsored by CISA.