Bypass in Symantec Messaging Gateway for Word File Processing
CVE-2017-6324
7.3HIGH
Key Information:
- Vendor
- Symantec Corporation
- Status
- Messaging Gateway
- Vendor
- CVE Published:
- 26 June 2017
Summary
The Symantec Messaging Gateway is susceptible to an issue where it improperly handles certain corrupted Word file attachments. Even with the 'disarm' feature activated, these files can still be processed, allowing potentially harmful macros to execute. This vulnerability represents a significant concern for organizations relying on this software to secure their email communications.
Affected Version(s)
Messaging Gateway All versions prior to version 10.6.3
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved