CVE-2016-9094

Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp7:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96298 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96298 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037961 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037961 - Third Party Advisory, VDB Entry
References () https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00 - Vendor Advisory () https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170306_00 - Vendor Advisory

Information

Published : 2018-04-16 19:29

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9094

Mitre link : CVE-2016-9094

CVE.ORG link : CVE-2016-9094


JSON object : View

Products Affected

symantec

  • endpoint_protection
CWE
CWE-20

Improper Input Validation