ID

VAR-201706-0551


CVE

CVE-2017-6325


TITLE

Symantec Messaging Gateway Code injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-005272

DESCRIPTION

The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application. Symantec Messaging Gateway Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to obtain potentially sensitive information and execute arbitrary local scripts. This could allow the attacker to compromise the application and the computer; other attacks are also possible. Versions prior to Symantec Messaging Gateway 10.6.3-266 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec

Trust: 2.07

sources: NVD: CVE-2017-6325 // JVNDB: JVNDB-2017-005272 // BID: 98890 // VULHUB: VHN-114528 // VULMON: CVE-2017-6325

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:lteversion:10.6.2

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.2

Trust: 0.9

vendor:symantecmodel:messaging gatewayscope: - version: -

Trust: 0.8

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.4

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:neversion:10.6.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:neversion:10.6.3-266

Trust: 0.3

sources: BID: 98890 // JVNDB: JVNDB-2017-005272 // CNNVD: CNNVD-201702-871 // NVD: CVE-2017-6325

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6325
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6325
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201702-871
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114528
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-6325
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6325
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-114528
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6325
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.7
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114528 // VULMON: CVE-2017-6325 // JVNDB: JVNDB-2017-005272 // CNNVD: CNNVD-201702-871 // NVD: CVE-2017-6325

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-114528 // JVNDB: JVNDB-2017-005272 // NVD: CVE-2017-6325

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-871

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201702-871

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005272

PATCH

title:SYM17-004url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00#_Symantec_Messaging_Gateway_3

Trust: 0.8

title:Symantec Security Advisories: Symantec Messaging Gateway Multiple Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=87a01cb99de9de36ac7e7d7b134aa96d

Trust: 0.1

sources: VULMON: CVE-2017-6325 // JVNDB: JVNDB-2017-005272

EXTERNAL IDS

db:NVDid:CVE-2017-6325

Trust: 2.9

db:BIDid:98890

Trust: 1.5

db:SECTRACKid:1038785

Trust: 1.2

db:JVNDBid:JVNDB-2017-005272

Trust: 0.8

db:CNNVDid:CNNVD-201702-871

Trust: 0.7

db:VULHUBid:VHN-114528

Trust: 0.1

db:VULMONid:CVE-2017-6325

Trust: 0.1

sources: VULHUB: VHN-114528 // VULMON: CVE-2017-6325 // BID: 98890 // JVNDB: JVNDB-2017-005272 // CNNVD: CNNVD-201702-871 // NVD: CVE-2017-6325

REFERENCES

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00

Trust: 2.0

url:http://www.securityfocus.com/bid/98890

Trust: 1.2

url:http://www.securitytracker.com/id/1038785

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6325

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6325

Trust: 0.8

url:http://www.symantec.com

Trust: 0.3

url:https://www.symantec.com/products/messaging-security/messaging-gateway

Trust: 0.3

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=54310

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-114528 // VULMON: CVE-2017-6325 // BID: 98890 // JVNDB: JVNDB-2017-005272 // CNNVD: CNNVD-201702-871 // NVD: CVE-2017-6325

CREDITS

Mehmet Dursun Ince

Trust: 0.3

sources: BID: 98890

SOURCES

db:VULHUBid:VHN-114528
db:VULMONid:CVE-2017-6325
db:BIDid:98890
db:JVNDBid:JVNDB-2017-005272
db:CNNVDid:CNNVD-201702-871
db:NVDid:CVE-2017-6325

LAST UPDATE DATE

2024-11-23T22:12:59.831000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114528date:2017-07-07T00:00:00
db:VULMONid:CVE-2017-6325date:2017-07-07T00:00:00
db:BIDid:98890date:2017-06-21T00:00:00
db:JVNDBid:JVNDB-2017-005272date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201702-871date:2017-06-27T00:00:00
db:NVDid:CVE-2017-6325date:2024-11-21T03:29:33.960

SOURCES RELEASE DATE

db:VULHUBid:VHN-114528date:2017-06-26T00:00:00
db:VULMONid:CVE-2017-6325date:2017-06-26T00:00:00
db:BIDid:98890date:2017-06-21T00:00:00
db:JVNDBid:JVNDB-2017-005272date:2017-07-25T00:00:00
db:CNNVDid:CNNVD-201702-871date:2017-02-27T00:00:00
db:NVDid:CVE-2017-6325date:2017-06-26T21:29:00.237