Symantec Protection for SharePoint Servers 6.0.3 to 6.0.5 < HF1.5 / 6.0.6 < HF1.6 Multiple Vulnerabilities (SYM16-010)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A security application installed on the remote host is affected by
multiple vulnerabilities.

Description :

The version of Symantec Protection for SharePoint Servers installed
on the remote host is 6.0.3 to 6.0.5 prior to HF1.5 or 6.0.6 prior to
HF1.6. It is, therefore, affected by multiple vulnerabilities :

- An array indexing error exists in the Unpack::ShortLZ()
function within file unpack15.cpp due to improper
validation of input when decompressing RAR files. An
unauthenticated, remote attacker can exploit this, via
a specially crafted file, to corrupt memory, resulting
in a denial of service condition or the execution of
arbitrary code. (CVE-2016-2207)

- A stack-based buffer overflow condition exists when
handling PowerPoint files due to improper validation of
user-supplied input while handling misaligned stream
caches. An unauthenticated, remote attacker can exploit
this, via a specially crafted PPT file, to cause a
denial of service condition or the execution of
arbitrary code. (CVE-2016-2209)

- A stack-based buffer overflow condition exists in the
CSymLHA::get_header() function within file Dec2LHA.dll
due to improper validation of user-supplied input when
decompressing LZH and LHA archive files. An
unauthenticated, remote attacker can exploit this, via a
specially crafted archive file, to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2016-2210)

- Multiple unspecified flaws exist in libmspack library
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit these, via
a specially crafted CAB file, to corrupt memory,
resulting in a denial of service condition or the
execution of arbitrary code. (CVE-2016-2211)

- A heap buffer overflow condition exists in the
CMIMEParser::UpdateHeader() function due to improper
validation of user-supplied input when parsing MIME
messages. An unauthenticated, remote attacker can
exploit this, via a specially crafted MIME message, to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2016-3644)

- An integer overflow condition exists in the
Attachment::setDataFromAttachment() function within file
Dec2TNEF.dll due to improper validation of user-supplied
input when decoding TNEF files. An unauthenticated,
remote attacker can exploit this, via a specially
crafted TNEF file, to cause a denial of service
condition or the execution of arbitrary code.
(CVE-2016-3645)

- An array indexing error exists in the
ALPkOldFormatDecompressor::UnShrink() function within
the scan engine decomposer due to improper validation of
input when decoding ZIP files. An unauthenticated,
remote attacker can exploit this, via a specially
crafted ZIP file, to corrupt memory, resulting in a
denial of service condition or the execution of
arbitrary code. (CVE-2016-3646)

See also :

http://www.nessus.org/u?175e28a5
https://support.symantec.com/en_US/article.INFO3795.html

Solution :

Apply the appropriate hotfix according to the vendor advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now