Executive Summary

Informations
Name CVE-2016-5309 First vendor Publication 2017-04-14
Vendor Cve Last vendor Modification 2021-09-09

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5309

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-125 Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Application 1
Application 213
Application 2
Application 1
Application 2
Application 11
Application 21
Application 2
Application 8
Application 5
Application 1
Application 1

Nessus® Vulnerability Scanner

Date Description
2016-09-26 Name : A security application installed on the remote host is affected by multiple d...
File : symantec_endpoint_prot_client_sym16-015.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : A messaging security application running on the remote host is affected by mu...
File : symantec_messaging_gateway_sym16-015.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : A security application installed on the remote host is affected by multiple d...
File : symantec_protection_engine_sym16_015.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : A security application installed on the remote host is affected by multiple v...
File : symantec_protection_engine_sym16_015_nix.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : A security application installed on the remote host is affected by multiple d...
File : symantec_protection_sharepoint_servers_sym16_015.nasl - Type : ACT_GATHER_INFO
2016-09-22 Name : A security application installed on the remote host is affected by multiple d...
File : symantec_sms_sym_16-015.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/92868
CONFIRM https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=sec...
EXPLOIT-DB https://www.exploit-db.com/exploits/40405/
MISC https://bugs.chromium.org/p/project-zero/issues/detail?id=867
SECTRACK http://www.securitytracker.com/id/1036847
http://www.securitytracker.com/id/1036848
http://www.securitytracker.com/id/1036849
http://www.securitytracker.com/id/1036850

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Date Informations
2023-09-28 12:34:24
  • Multiple Updates
2021-09-09 21:23:04
  • Multiple Updates
2021-05-05 01:22:14
  • Multiple Updates
2021-05-04 12:51:22
  • Multiple Updates
2021-04-22 02:04:12
  • Multiple Updates
2020-05-24 01:19:01
  • Multiple Updates
2020-05-23 02:00:40
  • Multiple Updates
2020-05-23 00:52:12
  • Multiple Updates
2019-08-09 12:08:19
  • Multiple Updates
2019-07-24 12:02:50
  • Multiple Updates
2019-07-17 12:08:33
  • Multiple Updates
2019-06-27 12:07:42
  • Multiple Updates
2019-06-21 12:07:42
  • Multiple Updates
2019-05-04 12:06:59
  • Multiple Updates
2019-05-03 12:06:36
  • Multiple Updates
2018-08-13 12:01:18
  • Multiple Updates
2018-01-06 12:05:13
  • Multiple Updates
2017-11-30 12:04:23
  • Multiple Updates
2017-04-26 00:21:32
  • Multiple Updates
2017-04-15 00:21:00
  • First insertion