Vulnerability Details : CVE-2016-8021
Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.
Vulnerability category: Execute code
Products affected by CVE-2016-8021
- cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:linux:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-8021
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8021
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
5.0
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N |
1.3
|
3.6
|
NIST |
CWE ids for CVE-2016-8021
-
The product does not verify, or incorrectly verifies, the cryptographic signature for data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8021
-
https://www.exploit-db.com/exploits/40911/
McAfee Virus Scan Enterprise for Linux 1.9.2 < 2.0.2 - Remote Code Execution
-
http://www.securityfocus.com/bid/94823
McAfee VirusScan Enterprise Multiple Security Vulnerabilities
-
http://www.securitytracker.com/id/1037433
McAfee VirusScan Enterprise for Linux Multiple Bugs Let Remote Users Deny Service, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10181
McAfee Security Bulletin: VirusScan Enterprise for Linux/LinuxShield update fixes multiple vulnerabilities (CVE-2016-8016, CVE-2016-8017, CVE-2016-8018, CVE-2016-8019, CVE-2016-8020, CVE-2016-8021, CVVendor Advisory
Jump to