Vulnerability Details : CVE-2016-3646
The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation) via a crafted ZIP archive that is mishandled during decompression.
Vulnerability category: Input validationExecute codeDenial of service
Products affected by CVE-2016-3646
- cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_internet_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_360:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:macos:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp2:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp3:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1.6:mp4:*:*:*:linux:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.5:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.6:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.0:mp1:*:*:*:*:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:data_center_security_server:6.6:*:*:*:*:*:*:*
- Symantec » Mail Security For Microsoft ExchangeVersions from including (>=) 7.5 and up to, including, (<=) 7.5.4cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:*:*:*:*:*:*:*:*
- Symantec » Mail Security For Microsoft ExchangeVersions from including (>=) 7.0 and up to, including, (<=) 7.0.4cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:mail_security_for_microsoft_exchange:6.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_power_eraser:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:protection_engine:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:protection_engine:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:protection_engine:7.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:message_gateway:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_security_with_backup:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_security:*:*:*:*:*:macos:*:*
- cpe:2.3:a:symantec:ngc:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:message_gateway_for_service_providers:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:message_gateway_for_service_providers:10.6:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:norton_bootable_removal_tool:*:*:*:*:*:*:*:*
- Symantec » Mail Security For DominoVersions from including (>=) 8.0 and up to, including, (<=) 8.0.9cpe:2.3:a:symantec:mail_security_for_domino:*:*:*:*:*:*:*:*
- Symantec » Mail Security For DominoVersions from including (>=) 8.1 and up to, including, (<=) 8.1.3cpe:2.3:a:symantec:mail_security_for_domino:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:advanced_threat_protection:*:*:*:*:*:*:*:*
- Symantec » Protection For Sharepoint ServersVersions from including (>=) 6.03 and up to, including, (<=) 6.05cpe:2.3:a:symantec:protection_for_sharepoint_servers:*:*:*:*:*:*:*:*
- Symantec » Protection For Sharepoint ServersVersions from including (>=) 6.0 and up to, including, (<=) 6.0.6cpe:2.3:a:symantec:protection_for_sharepoint_servers:*:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:csapi:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3646
12.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3646
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
8.4
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.5
|
5.9
|
NIST |
CWE ids for CVE-2016-3646
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3646
-
http://www.securitytracker.com/id/1036198
Symantec Endpoint Protection Flaws in Symantec Decomposer Engine Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/91435
Multiple Symantec Products CVE-2016 -3646 ZIP Decompression Denial Of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_00
Symantec Decomposer Engine Multiple Parsing VulnerabilitiesVendor Advisory
-
http://www.securitytracker.com/id/1036199
Norton Anti-Virus Flaws in Symantec Decomposer Engine Let Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/40036/
Symantec AntiVirus - Missing Bounds Checks in dec2zip ALPkOldFormatDecompressor::UnShrinkThird Party Advisory;VDB Entry
Jump to