ID CVE-2017-6330 Type cve Reporter cve@mitre.org Modified 2019-10-03T00:03:00
Description
Symantec Encryption Desktop before SED 10.4.1MP2 can allow remote attackers to cause a denial of service (resource consumption) via crafted web requests."
{"openvas": [{"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-6330"], "description": "The host is installed with Symantec\n Encryption Desktop and is prone to denial-of-service vulnerability.", "modified": "2018-10-19T00:00:00", "published": "2017-09-22T00:00:00", "id": "OPENVAS:1361412562310811786", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310811786", "type": "openvas", "title": "Symantec Encryption Desktop Denial-of-Service Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_symantec_encryption_desktop_dos_vuln_win.nasl 11983 2018-10-19 10:04:45Z mmartin $\n#\n# Symantec Encryption Desktop Denial-of-Service Vulnerability (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:symantec:encryption_desktop\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.811786\");\n script_version(\"$Revision: 11983 $\");\n script_cve_id(\"CVE-2017-6330\");\n script_bugtraq_id(100552);\n script_tag(name:\"cvss_base\", value:\"4.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-19 12:04:45 +0200 (Fri, 19 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2017-09-22 11:53:27 +0530 (Fri, 22 Sep 2017)\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_name(\"Symantec Encryption Desktop Denial-of-Service Vulnerability (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Symantec\n Encryption Desktop and is prone to denial-of-service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists due to some unspecified error\n within the application.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to cause denial-of-service conditions.\");\n\n script_tag(name:\"affected\", value:\"Symantec Encryption Desktop prior to\n version 10.4.1MP2.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Symantec Encryption Desktop\n version 10.4.1MP2 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170907_00\");\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_pgp_desktop_detect_win.nasl\");\n script_mandatory_keys(\"PGPDesktop_or_EncryptionDesktop/Win/Installed\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!symanVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\n## 10.4.1MP2 == 10.4.1.759\nif(version_is_less(version:symanVer, test_version:\"10.4.1.7591\"))\n{\n report = report_fixed_ver(installed_version:symanVer, fixed_version:\"10.4.1MP2\");\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2021-01-01T03:40:31", "description": "The version of Symantec Encryption Desktop installed on the remote\nhost is version 10.x prior to 10.4.1 MP2. It is, therefore, affected\nby a denial of service vulnerability.", "edition": 28, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-09-15T00:00:00", "title": "Symantec Encryption Desktop 10.x < 10.4.1 MP2 DoS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-6330"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:symantec:encryption_desktop", "cpe:/a:symantec:pgp_desktop"], "id": "MACOSX_SYMANTEC_ENCRYPTION_DESKTOP_SYM17-008.NASL", "href": "https://www.tenable.com/plugins/nessus/103251", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103251);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\"CVE-2017-6330\");\n script_bugtraq_id(100552);\n\n script_name(english:\"Symantec Encryption Desktop 10.x < 10.4.1 MP2 DoS\");\n script_summary(english:\"Checks the Symantec Encryption Desktop version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a data encryption application installed that is\naffected by a denial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Symantec Encryption Desktop installed on the remote\nhost is version 10.x prior to 10.4.1 MP2. It is, therefore, affected\nby a denial of service vulnerability.\");\n # https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1115b8a5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Symantec Encryption Desktop 10.4.1 MP2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-6330\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/09/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/09/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/09/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:symantec:encryption_desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:symantec:pgp_desktop\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_symantec_encryption_desktop_installed.nbin\");\n script_require_keys(\"Host/MacOSX/Version\", \"Host/local_checks_enabled\", \"installed_sw/Symantec Encryption Desktop\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\ninclude(\"vcf.inc\");\n\napp_info = vcf::get_app_info(app:\"Symantec Encryption Desktop\");\n\n# MP2 is build 759\nconstraints = [ { \"min_version\" : \"10.0\", \"fixed_version\" : \"10.4.1.759\" } ];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING); \n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2021-01-01T06:33:34", "description": "The version of Symantec Encryption Desktop installed on the remote\nhost is version 10.x prior to 10.4.1 MP2. It is, therefore, affected\nby a denial of service vulnerability.", "edition": 29, "cvss3": {"score": 6.5, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}, "published": "2017-09-13T00:00:00", "title": "Symantec Encryption Desktop 10.x < 10.4.1 MP2 DoS", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-6330"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:symantec:encryption_desktop", "cpe:/a:symantec:pgp_desktop"], "id": "SYMANTEC_ENCRYPTION_DESKTOP_SYM17-008.NASL", "href": "https://www.tenable.com/plugins/nessus/103195", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(103195);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/12\");\n\n script_cve_id(\"CVE-2017-6330\");\n script_bugtraq_id(100552);\n\n script_name(english:\"Symantec Encryption Desktop 10.x < 10.4.1 MP2 DoS\");\n script_summary(english:\"Checks the Symantec Encryption Desktop version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a data encryption application installed that is\naffected by a denial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Symantec Encryption Desktop installed on the remote\nhost is version 10.x prior to 10.4.1 MP2. It is, therefore, affected\nby a denial of service vulnerability.\");\n # https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1115b8a5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Symantec Encryption Desktop 10.4.1 MP2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-6330\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/09/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/09/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/09/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:symantec:encryption_desktop\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:symantec:pgp_desktop\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"symantec_encryption_desktop_installed.nbin\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Symantec Encryption Desktop\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\ninclude(\"vcf.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n\n\napp_info = vcf::get_app_info(app:\"Symantec Encryption Desktop\", win_local:TRUE);\n\n# MP2 is build 759\nconstraints = [ { \"min_version\" : \"10.0\", \"fixed_version\" : \"10.4.1.759\" } ];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}], "symantec": [{"lastseen": "2020-12-24T10:40:47", "bulletinFamily": "software", "cvelist": ["CVE-2017-6330"], "description": "### SUMMARY\n\n \n\nSymantec has released an update to address an issue in the Symantec Encryption Desktop product.\n\n### AFFECTED PRODUCTS\n\n \n\n**Symantec Encryption Desktop (SED)** \n \n--- \n \n### **CVE**\n\n| \n\n### **Affected Version(s)**\n\n| \n\n### **Remediation** \n \nCVE-2017-6330\n\n| \n\nPrior to 10.4.1MP2\n\n| \n\nUpgrade to 10.4.1MP2 \n \n## \n\n### ISSUES\n\n \n\n**CVE-2017-6330** \n \n--- \n \n**Severity/CVSSv3:**\n\n| \n\nMedium / 5.7 [AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H>) \n \n**References:**\n\n**Impact:**\n\n| \n\nSecurityfocus: [BID 100552](<https://www.securityfocus.com/bid/100552>) / NVD: [CVE-2017-6330](<https://nvd.nist.gov/vuln/detail/CVE-2017-6330>)\n\nDenial of service \n \n**Description:**\n\n| \n\nA Denial of Service (DoS) attack, is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. DoS attacks can occur when a system becomes flooded with specific network requests or subversive operations that can cause the resourced system to become unresponsive. \n \n \n\n### MITIGATION\n\n \n\nThis issue was validated by the product team engineers. A Symantec Encryption Desktop update, version SED 10.4.1MP2, has been released which addresses the aforementioned vulnerability. Note that the Symantec Encryption Desktop's latest release and patches are available to customers through normal support channels. At this time, Symantec is not aware of any exploitations or adverse customer impact from these issues.\n\n**Best Practices**\n\nSymantec recommends the following measures to reduce risk of attack:\n\n * Restrict access to administrative or management systems to authorized privileged users.\n * Restrict remote access to trusted/authorized systems only.\n * Run under the principle of least privilege, where possible, to limit the impact of potential exploit.\n * Keep all operating systems and applications current with vendor patches.\n * Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.\n * Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.\n\n \n\n### ACKNOWLEDGEMENTS\n\n \n\n * _Kyriakos Economou (@kyREcon) on behalf of Nettitude: https://www.nettitude.com/ (CVE-2017-6330)_\n", "modified": "2020-03-05T14:52:32", "published": "2017-09-07T08:00:00", "id": "SMNTC-1414", "href": "", "type": "symantec", "title": "Symantec Encryption Desktop DoS", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}}]}