CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.2%
The version of Symantec Protection for SharePoint Servers installed on the remote host is 6.0.3 to 6.0.5 prior to HF1.5 or 6.0.6 prior to HF1.6. It is, therefore, affected by multiple vulnerabilities :
An array indexing error exists in the Unpack::ShortLZ() function within file unpack15.cpp due to improper validation of input when decompressing RAR files. An unauthenticated, remote attacker can exploit this, via a specially crafted file, to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2016-2207)
A stack-based buffer overflow condition exists when handling PowerPoint files due to improper validation of user-supplied input while handling misaligned stream caches. An unauthenticated, remote attacker can exploit this, via a specially crafted PPT file, to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-2209)
A stack-based buffer overflow condition exists in the CSymLHA::get_header() function within file Dec2LHA.dll due to improper validation of user-supplied input when decompressing LZH and LHA archive files. An unauthenticated, remote attacker can exploit this, via a specially crafted archive file, to cause a denial of service condition or the execution of arbitrary code.
(CVE-2016-2210)
Multiple unspecified flaws exist in libmspack library due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, via a specially crafted CAB file, to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2016-2211)
A heap buffer overflow condition exists in the CMIMEParser::UpdateHeader() function due to improper validation of user-supplied input when parsing MIME messages. An unauthenticated, remote attacker can exploit this, via a specially crafted MIME message, to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-3644)
An integer overflow condition exists in the Attachment::setDataFromAttachment() function within file Dec2TNEF.dll due to improper validation of user-supplied input when decoding TNEF files. An unauthenticated, remote attacker can exploit this, via a specially crafted TNEF file, to cause a denial of service condition or the execution of arbitrary code.
(CVE-2016-3645)
An array indexing error exists in the ALPkOldFormatDecompressor::UnShrink() function within the scan engine decomposer due to improper validation of input when decoding ZIP files. An unauthenticated, remote attacker can exploit this, via a specially crafted ZIP file, to corrupt memory, resulting in a denial of service condition or the execution of arbitrary code. (CVE-2016-3646)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(93408);
script_version("1.8");
script_cvs_date("Date: 2019/11/14");
script_cve_id(
"CVE-2016-2207",
"CVE-2016-2209",
"CVE-2016-2210",
"CVE-2016-2211",
"CVE-2016-3644",
"CVE-2016-3645",
"CVE-2016-3646"
);
script_bugtraq_id(
91431,
91434,
91435,
91436,
91437,
91438,
91439
);
script_name(english:"Symantec Protection for SharePoint Servers 6.0.3 to 6.0.5 < HF1.5 / 6.0.6 < HF1.6 Multiple Vulnerabilities (SYM16-010)");
script_summary(english:"Checks the version of Symantec Protection for SharePoint Servers.");
script_set_attribute(attribute:"synopsis", value:
"A security application installed on the remote host is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Symantec Protection for SharePoint Servers installed
on the remote host is 6.0.3 to 6.0.5 prior to HF1.5 or 6.0.6 prior to
HF1.6. It is, therefore, affected by multiple vulnerabilities :
- An array indexing error exists in the Unpack::ShortLZ()
function within file unpack15.cpp due to improper
validation of input when decompressing RAR files. An
unauthenticated, remote attacker can exploit this, via
a specially crafted file, to corrupt memory, resulting
in a denial of service condition or the execution of
arbitrary code. (CVE-2016-2207)
- A stack-based buffer overflow condition exists when
handling PowerPoint files due to improper validation of
user-supplied input while handling misaligned stream
caches. An unauthenticated, remote attacker can exploit
this, via a specially crafted PPT file, to cause a
denial of service condition or the execution of
arbitrary code. (CVE-2016-2209)
- A stack-based buffer overflow condition exists in the
CSymLHA::get_header() function within file Dec2LHA.dll
due to improper validation of user-supplied input when
decompressing LZH and LHA archive files. An
unauthenticated, remote attacker can exploit this, via a
specially crafted archive file, to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2016-2210)
- Multiple unspecified flaws exist in libmspack library
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit these, via
a specially crafted CAB file, to corrupt memory,
resulting in a denial of service condition or the
execution of arbitrary code. (CVE-2016-2211)
- A heap buffer overflow condition exists in the
CMIMEParser::UpdateHeader() function due to improper
validation of user-supplied input when parsing MIME
messages. An unauthenticated, remote attacker can
exploit this, via a specially crafted MIME message, to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2016-3644)
- An integer overflow condition exists in the
Attachment::setDataFromAttachment() function within file
Dec2TNEF.dll due to improper validation of user-supplied
input when decoding TNEF files. An unauthenticated,
remote attacker can exploit this, via a specially
crafted TNEF file, to cause a denial of service
condition or the execution of arbitrary code.
(CVE-2016-3645)
- An array indexing error exists in the
ALPkOldFormatDecompressor::UnShrink() function within
the scan engine decomposer due to improper validation of
input when decoding ZIP files. An unauthenticated,
remote attacker can exploit this, via a specially
crafted ZIP file, to corrupt memory, resulting in a
denial of service condition or the execution of
arbitrary code. (CVE-2016-3646)");
# https://support.symantec.com/en_US/article.SYMSA1371.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76c14f65");
script_set_attribute(attribute:"see_also", value:"https://support.symantec.com/en_US/article.INFO3795.html");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate hotfix according to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-3646");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/28");
script_set_attribute(attribute:"patch_publication_date", value:"2016/06/28");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/09/09");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:protection_for_sharepoint_servers");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("symantec_scan_engine_installed.nasl", "symantec_protection_sharepoint_servers.nbin");
script_require_keys("SMB/symantec_scan_engine/Installed", "installed_sw/Symantec Protection for SharePoint Servers");
script_require_ports(139, 445);
exit(0);
}
include("audit.inc");
include("misc_func.inc");
include("smb_func.inc");
include("smb_hotfixes.inc");
include("smb_hotfixes_fcheck.inc");
include("install_func.inc");
function check_hf(path)
{
local_var loc, locs, content;
local_var line, matches, vuln;
vuln = FALSE;
hotfix_check_fversion_init();
locs = make_list(path, path + "Definitions\Decomposer\");
foreach loc(locs)
{
if (hotfix_check_fversion(file:"dec2.dll", version:"5.4.6.2", path:loc))
{
vuln = TRUE;
break;
}
}
hotfix_check_fversion_end();
return vuln;
}
spepath = get_kb_item_or_exit("Symantec/Symantec Protection Engine/Path");
app = "Symantec Protection for SharePoint Servers";
install = get_single_install(app_name:app);
version = install["version"];
path = install["path"];
fix = NULL;
if (version =~ "^6\.0\.[3-5]($|[^0-9])" && check_hf(path:spepath))
fix = "SPSS 6.0.3 to 6.0.5 HF 1.5";
else if (version =~ "^6\.0\.6($|[^0-9])" && check_hf(path:spepath))
fix = "SPSS 6.0.6 HF 1.6";
else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
if (!empty_or_null(fix))
{
report +=
'\n Path : ' + path +
'\n Installed version : ' + version +
'\n Fixed version : ' + fix +
'\n';
security_report_v4(severity:SECURITY_HOLE, port:0, extra:report);
}
else audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2211
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3644
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3645
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3646
www.nessus.org/u?76c14f65
support.symantec.com/en_US/article.INFO3795.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
98.2%