Vulnerability Description
The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident to the application.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Symantec | Messaging Gateway | <= 10.6.2 |
References
- http://www.securityfocus.com/bid/98889Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038785
- https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=securiVendor Advisory
- http://www.securityfocus.com/bid/98889Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038785
- https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=securiVendor Advisory
FAQ
What is CVE-2017-6324?
CVE-2017-6324 is a vulnerability with a CVSS score of 7.3 (HIGH). The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having th...
How severe is CVE-2017-6324?
CVE-2017-6324 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6324?
Check the references section above for vendor advisories and patch information. Affected products include: Symantec Messaging Gateway.