ID CVE-2016-5309
Summary The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression.
References
Vulnerable Configurations
  • cpe:2.3:a:symantec:web_security.cloud
    cpe:2.3:a:symantec:web_security.cloud
  • cpe:2.3:a:symantec:web_gateway
    cpe:2.3:a:symantec:web_gateway
  • cpe:2.3:a:symantec:messaging_gateway_for_service_providers:10.6
    cpe:2.3:a:symantec:messaging_gateway_for_service_providers:10.6
  • cpe:2.3:a:symantec:messaging_gateway_for_service_providers:10.5
    cpe:2.3:a:symantec:messaging_gateway_for_service_providers:10.5
  • Symantec Messaging Gateway 10.6.1
    cpe:2.3:a:symantec:messaging_gateway:10.6.1
  • Symantec Protection For SharePoint Servers 6.0.3
    cpe:2.3:a:symantec:protection_for_sharepoint_servers:6.0.3
  • Symantec Protection For SharePoint Servers 6.0.4
    cpe:2.3:a:symantec:protection_for_sharepoint_servers:6.0.4
  • Symantec Protection For SharePoint Servers 6.0.5
    cpe:2.3:a:symantec:protection_for_sharepoint_servers:6.0.5
  • Symantec Protection For SharePoint Servers 6.0.6
    cpe:2.3:a:symantec:protection_for_sharepoint_servers:6.0.6
  • Symantec Protection For SharePoint Servers 6.0.7
    cpe:2.3:a:symantec:protection_for_sharepoint_servers:6.0.7
  • Symantec Mail Security for Microsoft Exchange 7.5.4
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.5.4
  • Symantec Mail Security For Microsoft Exchange 7.5.3
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.5.3
  • Symantec Mail Security For Microsoft Exchange 7.5.2
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.5.2
  • Symantec Mail Security For Microsoft Exchange 7.5.1
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.5.1
  • Symantec Mail Security For Microsoft Exchange 7.5
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.5
  • Symantec Mail Security for Microsoft Exchange 6.5.8
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:6.5.8
  • Symantec Mail Security for Microsoft Exchange 7.0.4
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.0.4
  • Symantec Mail Security For Microsoft Exchange 7.0.3
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.0.3
  • Symantec Mail Security For Microsoft Exchange 7.0.2
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.0.2
  • Symantec Mail Security For Microsoft Exchange 7.0.1
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.0.1
  • Symantec Mail Security For Microsoft Exchange 7.0
    cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:7.0
  • Symantec Mail Security for Domino 8.0.9
    cpe:2.3:a:symantec:mail_security_for_domino:8.0.9
  • Symantec Mail Security for Domino 8.1.3
    cpe:2.3:a:symantec:mail_security_for_domino:8.1.3
  • Symantec Mail Security For Domino 8.1.2
    cpe:2.3:a:symantec:mail_security_for_domino:8.1.2
  • Symantec Protection Engine 7.0.5
    cpe:2.3:a:symantec:protection_engine:7.0.5
  • Symantec Protection Engine 7.5.1
    cpe:2.3:a:symantec:protection_engine:7.5.1
  • Symantec Protection Engine 7.5.2
    cpe:2.3:a:symantec:protection_engine:7.5.2
  • Symantec Protection Engine 7.5.0
    cpe:2.3:a:symantec:protection_engine:7.5.0
  • Symantec Protection Engine 7.5.5
    cpe:2.3:a:symantec:protection_engine:7.5.5
  • Symantec Protection Engine 7.5.3
    cpe:2.3:a:symantec:protection_engine:7.5.3
  • Symantec Protection Engine 7.8.0
    cpe:2.3:a:symantec:protection_engine:7.8.0
  • Symantec Protection Engine 7.5.4
    cpe:2.3:a:symantec:protection_engine:7.5.4
  • Symantec CSAPI 10.0.4
    cpe:2.3:a:symantec:csapi:10.0.4
  • cpe:2.3:a:symantec:endpoint_protection_for_small_business:12.1
    cpe:2.3:a:symantec:endpoint_protection_for_small_business:12.1
  • cpe:2.3:a:symantec:endpoint_protection_cloud:-:-:-:-:-:mac
    cpe:2.3:a:symantec:endpoint_protection_cloud:-:-:-:-:-:mac
  • cpe:2.3:a:symantec:endpoint_protection_cloud:-:-:-:-:-:windows
    cpe:2.3:a:symantec:endpoint_protection_cloud:-:-:-:-:-:windows
  • cpe:2.3:a:symantec:endpoint_protection_for_small_business:-:-:-:-:enterprise
    cpe:2.3:a:symantec:endpoint_protection_for_small_business:-:-:-:-:enterprise
  • cpe:2.3:a:symantec:endpoint_protection:12.1.6:-:-:-:-:linux
    cpe:2.3:a:symantec:endpoint_protection:12.1.6:-:-:-:-:linux
  • cpe:2.3:a:symantec:endpoint_protection:12.1.6:-:-:-:-:windows
    cpe:2.3:a:symantec:endpoint_protection:12.1.6:-:-:-:-:windows
  • cpe:2.3:a:symantec:endpoint_protection:12.1.4:-:-:-:-:mac
    cpe:2.3:a:symantec:endpoint_protection:12.1.4:-:-:-:-:mac
  • cpe:2.3:a:symantec:data_center_security_server
    cpe:2.3:a:symantec:data_center_security_server
  • cpe:2.3:a:symantec:email_security.cloud
    cpe:2.3:a:symantec:email_security.cloud
  • cpe:2.3:a:symantec:advanced_threat_protection
    cpe:2.3:a:symantec:advanced_threat_protection
CVSS
Base: 4.3 (as of 25-04-2017 - 14:52)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Symantec rar Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write. CVE-2016-5309,CVE-2016-5310. Dos exploit for Multiple platform
file exploits/multiple/dos/40405.txt
id EDB-ID:40405
last seen 2016-09-21
modified 2016-09-21
platform multiple
port
published 2016-09-21
reporter Google Security Research
source https://www.exploit-db.com/download/40405/
title Symantec rar Decomposer Engine (Multiple Products) - Out-of-Bounds Read / Out-of-Bounds Write
type dos
nessus via4
  • NASL family Windows
    NASL id SYMANTEC_PROTECTION_SHAREPOINT_SERVERS_SYM16_015.NASL
    description The version of Symantec Protection for SharePoint Servers (SPSS) installed on the remote host is 6.0.3 to 6.0.5 prior to hotfix 2.5, 6.0.6 prior to hotfix 2.6, or 6.0.7 prior to hotfix 2.7. It is, therefore, affected by multiple denial of service vulnerabilities : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93658
    published 2016-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93658
    title Symantec Protection for SharePoint Servers 6.0.3 - 6.0.5 < HF2.5 / 6.0.6 < HF2.6 / 6.0.7 < HF2.7 Multiple DoS (SYM16-015)
  • NASL family CGI abuses
    NASL id SYMANTEC_MESSAGING_GATEWAY_SYM16-015.NASL
    description According to its self-reported version number, the Symantec Messaging Gateway (SMG) running on the remote host is 10.x prior to 10.6.2. It is, therefore, affected by multiple vulnerabilities : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310) - An information disclosure vulnerability exists in the charting component in the control center due to improper sanitization of user-supplied input submitted for charting requests. An authenticated, remote attacker can exploit this, via a directory traversal attack, to disclose arbitrary files or directory contents. (CVE-2016-5312) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93653
    published 2016-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93653
    title Symantec Messaging Gateway 10.x < 10.6.2 Multiple Vulnerabilities (SYM16-015) (SYM16-016)
  • NASL family Misc.
    NASL id SYMANTEC_PROTECTION_ENGINE_SYM16_015_NIX.NASL
    description The version of Symantec Protection Engine (SPE) installed on the remote Linux host is 7.0.x prior to 7.0.5 hotfix 02, 7.5.x prior to 7.5.5 hotifx 01, or 7.8.x prior to 7.8.0 hotifx 03. It is, therefore, affected by multiple denial of service vulnerabilities : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93655
    published 2016-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93655
    title Symantec Protection Engine 7.0.x < 7.0.5 HF02 / 7.5.x < 7.5.5 HF01 / 7.8.x < 7.8.0 HF03 Multiple DoS (SYM16-015) (Linux)
  • NASL family Windows
    NASL id SYMANTEC_SMS_SYM_16-015.NASL
    description The version of Symantec Mail Security for Exchange (SMSMSE) or Symantec Mail Security for Domino (SMSDOM) installed on the remote Windows host is affected by multiple denial of service vulnerabilities in the decomposer engine : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93652
    published 2016-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93652
    title Symantec Mail Security for Exchange and Domino Decomposer Engine Multiple DoS (SYM16-015)
  • NASL family Windows
    NASL id SYMANTEC_ENDPOINT_PROT_CLIENT_SYM16-015.NASL
    description The version of Symantec Endpoint Protection (SEP) Client installed on the remote Windows host is 12.1.x prior to 12.1.6 MP6 or else 12.1.6 MP5 without a hotfix. It is, therefore, affected by multiple denial of service vulnerabilities : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93717
    published 2016-09-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93717
    title Symantec Endpoint Protection Client 12.1.x < 12.1.6 MP6 Multiple DoS (SYM16-015)
  • NASL family Windows
    NASL id SYMANTEC_PROTECTION_ENGINE_SYM16_015.NASL
    description The version of Symantec Protection Engine (SPE) installed on the remote Windows host is 7.0.x prior to 7.0.5 hotfix 02, 7.5.x prior to 7.5.5 hotifx 01, or 7.8.x prior to 7.8.0 hotifx 03. It is, therefore, affected by multiple denial of service vulnerabilities : - A denial of service vulnerability exists in the decomposer engine due to an out-of-bounds read error that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5309) - A denial of service vulnerability exists in the decomposer engine due to memory corruption issue that occurs when decompressing RAR archives. An unauthenticated, remote attacker can exploit this, via a specially crafted RAR file, to crash the application. (CVE-2016-5310)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 93654
    published 2016-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93654
    title Symantec Protection Engine 7.0.x < 7.0.5 HF02 / 7.5.x < 7.5.5 HF01 / 7.8.x < 7.8.0 HF03 Multiple DoS (SYM16-015)
refmap via4
bid 92868
confirm https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160919_00
exploit-db 40405
misc https://bugs.chromium.org/p/project-zero/issues/detail?id=867
sectrack
  • 1036847
  • 1036848
  • 1036849
  • 1036850
Last major update 25-04-2017 - 14:58
Published 14-04-2017 - 14:59
Back to Top