|
|||
Rule General Information |
---|
Release Date: | 2019-06-25 | |
Rule Name: | Symantec Web Gateway Whitelist white_ip Command Execution Vulnerability (CVE-2016-5313) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:93284 http://packetstormsecurity.com/files/139006/Symantec-Web-Gateway-5.2.2-OS-Command-Injection.html http://seclists.org/fulldisclosure/2016/Oct/24 SecurityTrackerID:1036973 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid;=security_advisory&year;=&suid;=20161005_00 |