ID

VAR-201708-1313


CVE

CVE-2017-6328


TITLE

Symantec Messaging Gateway Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2017-007189

DESCRIPTION

The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of cross site request forgery (also known as one-click attack and is abbreviated as CSRF or XSRF), which is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. A CSRF attack attempts to exploit the trust that a specific website has in a user's browser. Symantec Messaging Gateway Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. Versions prior to Symantec Messaging Gateway 10.6.3-267 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec

Trust: 1.98

sources: NVD: CVE-2017-6328 // JVNDB: JVNDB-2017-007189 // BID: 100136 // VULHUB: VHN-114531

AFFECTED PRODUCTS

vendor:symantecmodel:message gatewayscope:lteversion:10.6.3-2

Trust: 1.0

vendor:symantecmodel:message gatewayscope:ltversion:10.6.3-267

Trust: 0.8

vendor:symantecmodel:message gatewayscope:eqversion:10.6.3-2

Trust: 0.6

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3-3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.3-266

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.1-3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.0-7

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6.0-3

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.6

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:10.0

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:neversion:10.6.3-267

Trust: 0.3

sources: BID: 100136 // JVNDB: JVNDB-2017-007189 // CNNVD: CNNVD-201702-868 // NVD: CVE-2017-6328

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6328
value: HIGH

Trust: 1.0

NVD: CVE-2017-6328
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-868
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114531
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6328
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114531
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6328
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114531 // JVNDB: JVNDB-2017-007189 // CNNVD: CNNVD-201702-868 // NVD: CVE-2017-6328

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-114531 // JVNDB: JVNDB-2017-007189 // NVD: CVE-2017-6328

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-868

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201702-868

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007189

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-114531

PATCH

title:SYM17-006url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00

Trust: 0.8

sources: JVNDB: JVNDB-2017-007189

EXTERNAL IDS

db:NVDid:CVE-2017-6328

Trust: 2.8

db:BIDid:100136

Trust: 2.0

db:JVNDBid:JVNDB-2017-007189

Trust: 0.8

db:CNNVDid:CNNVD-201702-868

Trust: 0.7

db:NSFOCUSid:37417

Trust: 0.6

db:EXPLOIT-DBid:42613

Trust: 0.1

db:VULHUBid:VHN-114531

Trust: 0.1

sources: VULHUB: VHN-114531 // BID: 100136 // JVNDB: JVNDB-2017-007189 // CNNVD: CNNVD-201702-868 // NVD: CVE-2017-6328

REFERENCES

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00

Trust: 1.9

url:http://www.securityfocus.com/bid/100136

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6328

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6328

Trust: 0.8

url:http://www.nsfocus.net/vulndb/37417

Trust: 0.6

url:http://www.symantec.com

Trust: 0.3

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00

Trust: 0.1

sources: VULHUB: VHN-114531 // BID: 100136 // JVNDB: JVNDB-2017-007189 // CNNVD: CNNVD-201702-868 // NVD: CVE-2017-6328

CREDITS

Mishra Dhiraj.

Trust: 0.3

sources: BID: 100136

SOURCES

db:VULHUBid:VHN-114531
db:BIDid:100136
db:JVNDBid:JVNDB-2017-007189
db:CNNVDid:CNNVD-201702-868
db:NVDid:CVE-2017-6328

LAST UPDATE DATE

2024-11-23T22:59:15.926000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114531date:2017-08-24T00:00:00
db:BIDid:100136date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007189date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201702-868date:2017-08-14T00:00:00
db:NVDid:CVE-2017-6328date:2024-11-21T03:29:34.303

SOURCES RELEASE DATE

db:VULHUBid:VHN-114531date:2017-08-11T00:00:00
db:BIDid:100136date:2017-08-10T00:00:00
db:JVNDBid:JVNDB-2017-007189date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201702-868date:2017-02-27T00:00:00
db:NVDid:CVE-2017-6328date:2017-08-11T20:29:00.237