Description
Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9915 | Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client. |
References
History
No history.
Status: PUBLISHED
Assigner: symantec
Published:
Updated: 2024-09-16T17:18:11.443Z
Reserved: 2016-10-28T00:00:00.000Z
Link: CVE-2016-9094
No data.
Status : Modified
Published: 2018-04-16T19:29:00.293
Modified: 2024-11-21T03:00:35.373
Link: CVE-2016-9094
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD