search menu icon-carat-right cmu-wordmark

CERT Coordination Center

McAfee HTTP Server vulnerable to buffer overflow

Vulnerability Note VU#842452

Original Release Date: 2006-10-05 | Last Revised: 2006-10-05


A stack-based buffer overflow exists in the McAfee HTTP server that may allow a remote, unauthenticated attacker to execute arbitrary code.


The McAfee HTTP server (NAISERV.exe) is used in McAfee products, such as McAfee ePolicy Orchestrator and Protection Pilot. The McAfee HTTP Server is vulnerable to a stack-based buffer overflow that can be triggered by sending the server a malformed HTTP packet.

More information is available in McAfee Security Bulletin 8611438.

Note that exploit code for this vulnerability is publicly available.


A remote, unauthenticated attacker may be able to execute arbitrary code.


Apply a patch
McAfee addresses this vulnerability with the patches listed in McAfee Security Bulletin 8611438.

Limit Access to the McAfee HTTP Server

You may wish to block access to the vulnerable software from outside your network perimeter, specifically by blocking access to the ports used by the McAfee HTTP Server. This will limit your exposure to attacks. However, blocking at the network perimeter would still allow attackers within the perimeter of your network to exploit the vulnerability. The use of host-based firewalls in addition to network-based firewalls can help restrict access to specific hosts within the network. It is important to understand your network's configuration and service requirements before deciding what changes are appropriate.

Vendor Information


McAfee Affected

Updated:  October 04, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Refer to

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This issue was reported by muts.

This document was written by Jeff Gennari.

Other Information

CVE IDs: None
Severity Metric: 18.56
Date Public: 2006-10-02
Date First Published: 2006-10-05
Date Last Updated: 2006-10-05 11:21 UTC
Document Revision: 14

Sponsored by CISA.