Vulnerability Description
Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Symantec | Endpoint Protection | <= 14.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96298Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037961Third Party AdvisoryVDB Entry
- https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=securiVendor Advisory
- http://www.securityfocus.com/bid/96298Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037961Third Party AdvisoryVDB Entry
- https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=securiVendor Advisory
FAQ
What is CVE-2016-9094?
CVE-2016-9094 is a vulnerability with a CVSS score of 7.8 (HIGH). Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of form...
How severe is CVE-2016-9094?
CVE-2016-9094 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9094?
Check the references section above for vendor advisories and patch information. Affected products include: Symantec Endpoint Protection.