Lucene search

K
cve[email protected]CVE-2016-8021
HistoryMar 14, 2017 - 10:59 p.m.

CVE-2016-8021

2017-03-1422:59:01
CWE-347
web.nvd.nist.gov
42
cve-2016-8021
intel security
virusscan enterprise
linux
vsel 2.0.3
cryptographic signature verification
remote code execution
nvd

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

5.9 Medium

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.5%

Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.

Affected configurations

Vulners
NVD
Node
intelquickassist_technology_for_linuxRange<2.0.3

CNA Affected

[
  {
    "product": "VirusScan Enterprise Linux (VSEL)",
    "vendor": "Intel",
    "versions": [
      {
        "status": "affected",
        "version": "2.0.3 (and earlier)"
      }
    ]
  }
]

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

5.9 Medium

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.5%