Lucene search

K
openvasCopyright (C) 2016 Greenbone AGOPENVAS:1361412562310105620
HistoryApr 22, 2016 - 12:00 a.m.

Symantec Messaging Gateway Multiple Vulnerabilities (SYM16-005)

2016-04-2200:00:00
Copyright (C) 2016 Greenbone AG
plugins.openvas.org
15

6.5 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:M/C:C/I:C/A:C

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%

Symantec Messaging Gateway is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:symantec:messaging_gateway";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105620");
  script_version("2024-02-02T14:37:52+0000");
  script_tag(name:"last_modification", value:"2024-02-02 14:37:52 +0000 (Fri, 02 Feb 2024)");
  script_tag(name:"creation_date", value:"2016-04-22 10:36:01 +0200 (Fri, 22 Apr 2016)");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:M/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2016-12-03 03:24:00 +0000 (Sat, 03 Dec 2016)");

  script_cve_id("CVE-2016-2203", "CVE-2016-2204");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Symantec Messaging Gateway Multiple Vulnerabilities (SYM16-005)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2016 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_symantec_messaging_gateway_consolidation.nasl");
  script_mandatory_keys("symantec/smg/detected");

  script_tag(name:"summary", value:"Symantec Messaging Gateway is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Symantec Messaging Gateway (SMG) Appliance management console
  is susceptible to potential recovery of the AD password by any user with at least authorized read
  access to the appliance. Also, an admin or support user could potentially escalate a
  lower-privileged access to root on the appliance by escaping their terminal window to a
  privileged shell.");

  script_tag(name:"impact", value:"Successful exploitation could result in elevated access to the
  SMG Appliance management console or to the network environment.");

  script_tag(name:"affected", value:"Symantec Messaging Gateway version 10.6.0-7 and prior.");

  script_tag(name:"solution", value:"Update to version 10.6.1 or later.");

  script_xref(name:"URL", value:"https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year&suid=20160418_00");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/86137");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/86138");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if( ! version = get_app_version(cpe:CPE, nofork:TRUE ) )
  exit( 0 );

if( version =~ "^10\." ) {
  if( version_is_less( version:version, test_version:"10.6.1" ) ) {
    report = report_fixed_ver( installed_version:version, fixed_version:"10.6.1" );
    security_message( port:0, data:report );
    exit(0);
  }
}

exit( 99 );

6.5 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

MULTIPLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:M/C:C/I:C/A:C

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.3%