ID

VAR-201706-0550


CVE

CVE-2017-6324


TITLE

Symantec Messaging Gateway Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2017-005271

DESCRIPTION

The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident to the application. Symantec Messaging Gateway Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. Versions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec

Trust: 2.07

sources: NVD: CVE-2017-6324 // JVNDB: JVNDB-2017-005271 // BID: 98889 // VULHUB: VHN-114527 // VULMON: CVE-2017-6324

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:lteversion:10.6.2

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.2

Trust: 0.9

vendor:symantecmodel:messaging gatewayscope: - version: -

Trust: 0.8

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.4

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3-3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:neversion:10.6.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:neversion:10.6.3-266

Trust: 0.3

sources: BID: 98889 // JVNDB: JVNDB-2017-005271 // CNNVD: CNNVD-201702-872 // NVD: CVE-2017-6324

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6324
value: HIGH

Trust: 1.0

NVD: CVE-2017-6324
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-872
value: HIGH

Trust: 0.6

VULHUB: VHN-114527
value: HIGH

Trust: 0.1

VULMON: CVE-2017-6324
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6324
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-114527
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6324
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114527 // VULMON: CVE-2017-6324 // JVNDB: JVNDB-2017-005271 // CNNVD: CNNVD-201702-872 // NVD: CVE-2017-6324

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-114527 // JVNDB: JVNDB-2017-005271 // NVD: CVE-2017-6324

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-872

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201702-872

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005271

PATCH

title:SYM17-004url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00#_Symantec_Messaging_Gateway_3

Trust: 0.8

title:Symantec Messaging Gateway Fixes for permissions and access control issues vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100377

Trust: 0.6

title:Symantec Security Advisories: Symantec Messaging Gateway Multiple Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=87a01cb99de9de36ac7e7d7b134aa96d

Trust: 0.1

sources: VULMON: CVE-2017-6324 // JVNDB: JVNDB-2017-005271 // CNNVD: CNNVD-201702-872

EXTERNAL IDS

db:NVDid:CVE-2017-6324

Trust: 2.9

db:BIDid:98889

Trust: 2.1

db:SECTRACKid:1038785

Trust: 1.8

db:JVNDBid:JVNDB-2017-005271

Trust: 0.8

db:CNNVDid:CNNVD-201702-872

Trust: 0.7

db:VULHUBid:VHN-114527

Trust: 0.1

db:VULMONid:CVE-2017-6324

Trust: 0.1

sources: VULHUB: VHN-114527 // VULMON: CVE-2017-6324 // BID: 98889 // JVNDB: JVNDB-2017-005271 // CNNVD: CNNVD-201702-872 // NVD: CVE-2017-6324

REFERENCES

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00

Trust: 2.0

url:http://www.securityfocus.com/bid/98889

Trust: 1.8

url:http://www.securitytracker.com/id/1038785

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6324

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6324

Trust: 0.8

url:http://www.symantec.com/messaging-gateway

Trust: 0.3

url:http://www.symantec.com

Trust: 0.3

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=54309

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-114527 // VULMON: CVE-2017-6324 // BID: 98889 // JVNDB: JVNDB-2017-005271 // CNNVD: CNNVD-201702-872 // NVD: CVE-2017-6324

CREDITS

Adam Witt

Trust: 0.3

sources: BID: 98889

SOURCES

db:VULHUBid:VHN-114527
db:VULMONid:CVE-2017-6324
db:BIDid:98889
db:JVNDBid:JVNDB-2017-005271
db:CNNVDid:CNNVD-201702-872
db:NVDid:CVE-2017-6324

LAST UPDATE DATE

2024-11-23T22:12:59.865000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114527date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-6324date:2019-10-03T00:00:00
db:BIDid:98889date:2017-06-21T00:00:00
db:JVNDBid:JVNDB-2017-005271date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201702-872date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6324date:2024-11-21T03:29:33.847

SOURCES RELEASE DATE

db:VULHUBid:VHN-114527date:2017-06-26T00:00:00
db:VULMONid:CVE-2017-6324date:2017-06-26T00:00:00
db:BIDid:98889date:2017-06-21T00:00:00
db:JVNDBid:JVNDB-2017-005271date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201702-872date:2017-02-27T00:00:00
db:NVDid:CVE-2017-6324date:2017-06-26T21:29:00.187