CNVD-2016-04460

Vulnerability from cnvd - Published: 2016-07-05
VLAI Severity ?
Title
Symantec Endpoint Protection Manager和Client未授权访问漏洞
Description
Symantec Endpoint Protection(SEP)是美国赛门铁克(Symantec)公司的一套防病毒软件。SEP Manager和Client是其中的管理端和客户端软件。 SEP Manager和Client 12.1版本中存在未授权访问漏洞,攻击者可利用该漏洞访问Web服务器中的PHP JSESSIONID。
Severity
Patch Name
Symantec Endpoint Protection Manager和Client未授权访问漏洞的补丁
Patch Description
Symantec Endpoint Protection(SEP)是美国赛门铁克(Symantec)公司的一套防病毒软件。SEP Manager和Client是其中的管理端和客户端软件。 SEP Manager和Client 12.1版本中存在未授权访问漏洞,攻击者可利用该漏洞访问Web服务器中的PHP JSESSIONID。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_01

Reference
https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_01
Impacted products
Name
Symantec Endpoint Protection Manager (SEPM) 12.1,<RU6 MP5
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-3651"
    }
  },
  "description": "Symantec Endpoint Protection\uff08SEP\uff09\u662f\u7f8e\u56fd\u8d5b\u95e8\u94c1\u514b\uff08Symantec\uff09\u516c\u53f8\u7684\u4e00\u5957\u9632\u75c5\u6bd2\u8f6f\u4ef6\u3002SEP Manager\u548cClient\u662f\u5176\u4e2d\u7684\u7ba1\u7406\u7aef\u548c\u5ba2\u6237\u7aef\u8f6f\u4ef6\u3002\r\n\r\nSEP Manager\u548cClient 12.1\u7248\u672c\u4e2d\u5b58\u5728\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95eeWeb\u670d\u52a1\u5668\u4e2d\u7684PHP JSESSIONID\u3002",
  "discovererName": "Huy-Ngoc Dau, with Deloitte France;Josh Meyer, with the MITRE Corporation",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=\u0026suid=20160628_01",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-04460",
  "openTime": "2016-07-05",
  "patchDescription": "Symantec Endpoint Protection\uff08SEP\uff09\u662f\u7f8e\u56fd\u8d5b\u95e8\u94c1\u514b\uff08Symantec\uff09\u516c\u53f8\u7684\u4e00\u5957\u9632\u75c5\u6bd2\u8f6f\u4ef6\u3002SEP Manager\u548cClient\u662f\u5176\u4e2d\u7684\u7ba1\u7406\u7aef\u548c\u5ba2\u6237\u7aef\u8f6f\u4ef6\u3002\r\n\r\nSEP Manager\u548cClient 12.1\u7248\u672c\u4e2d\u5b58\u5728\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bbf\u95eeWeb\u670d\u52a1\u5668\u4e2d\u7684PHP JSESSIONID\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Symantec Endpoint Protection Manager\u548cClient\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Symantec Endpoint Protection Manager (SEPM) 12.1\uff0c\u003cRU6 MP5"
  },
  "referenceLink": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=\u0026suid=20160628_01",
  "serverity": "\u4e2d",
  "submitTime": "2016-07-01",
  "title": "Symantec Endpoint Protection Manager\u548cClient\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…