var-201706-0550
Vulnerability from variot
The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident to the application. Symantec Messaging Gateway Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. Versions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201706-0550", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "messaging gateway", "scope": "lte", "trust": 1.0, "vendor": "symantec", "version": "10.6.2" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.9, "vendor": "symantec", "version": "10.6.2" }, { "model": "messaging gateway", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5.2" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5.1" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5.4" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5.3" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5.3-3" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5.2" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5.1" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.6.1" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.6" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.1" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.3" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.2" }, { "model": "messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "messaging gateway", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.6.3" }, { "model": "messaging gateway", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.6.3-266" } ], "sources": [ { "db": "BID", "id": "98889" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.6.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-6324" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adam Witt", "sources": [ { "db": "BID", "id": "98889" } ], "trust": 0.3 }, "cve": "CVE-2017-6324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-6324", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-114527", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 7.3, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2017-6324", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-6324", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201702-872", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-114527", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-6324", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-114527" }, { "db": "VULMON", "id": "CVE-2017-6324" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the \u0027disarm\u0027 functionality enabled. This constitutes a \u0027bypass\u0027 of the disarm functionality resident to the application. Symantec Messaging Gateway Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. \nVersions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec", "sources": [ { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "BID", "id": "98889" }, { "db": "VULHUB", "id": "VHN-114527" }, { "db": "VULMON", "id": "CVE-2017-6324" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6324", "trust": 2.9 }, { "db": "BID", "id": "98889", "trust": 2.1 }, { "db": "SECTRACK", "id": "1038785", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-005271", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201702-872", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-114527", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-6324", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114527" }, { "db": "VULMON", "id": "CVE-2017-6324" }, { "db": "BID", "id": "98889" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "id": "VAR-201706-0550", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-114527" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:03:53.811000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SYM17-004", "trust": 0.8, "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=\u0026suid=20170621_00#_symantec_messaging_gateway_3" }, { "title": "Symantec Messaging Gateway Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100377" }, { "title": "Symantec Security Advisories: Symantec Messaging Gateway Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=87a01cb99de9de36ac7e7d7b134aa96d" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-6324" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114527" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=\u0026suid=20170621_00" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/98889" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1038785" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6324" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6324" }, { "trust": 0.3, "url": "http://www.symantec.com/messaging-gateway" }, { "trust": 0.3, "url": "http://www.symantec.com" }, { "trust": 0.1, "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026amp;pvid=security_advisory\u0026amp;year=\u0026amp;suid=20170621_00" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=54309" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-114527" }, { "db": "VULMON", "id": "CVE-2017-6324" }, { "db": "BID", "id": "98889" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-114527" }, { "db": "VULMON", "id": "CVE-2017-6324" }, { "db": "BID", "id": "98889" }, { "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "db": "NVD", "id": "CVE-2017-6324" }, { "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-06-26T00:00:00", "db": "VULHUB", "id": "VHN-114527" }, { "date": "2017-06-26T00:00:00", "db": "VULMON", "id": "CVE-2017-6324" }, { "date": "2017-06-21T00:00:00", "db": "BID", "id": "98889" }, { "date": "2017-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "date": "2017-06-26T21:29:00.187000", "db": "NVD", "id": "CVE-2017-6324" }, { "date": "2017-02-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-114527" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-6324" }, { "date": "2017-06-21T00:00:00", "db": "BID", "id": "98889" }, { "date": "2017-07-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005271" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2017-6324" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-872" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-872" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Symantec Messaging Gateway Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005271" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-872" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.