CVE-2016-9094

Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp7:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*

Information

Published : 2018-04-16 12:29

Updated : 2018-05-22 10:18


NVD link : CVE-2016-9094

Mitre link : CVE-2016-9094


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

symantec

  • endpoint_protection