CVE-2016-9094
16.04.2018, 19:29
Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on the intended target client.Enginsight
Vendor | Product | Version |
---|---|---|
symantec | endpoint_protection | 𝑥 ≤ 14.0 |
symantec | endpoint_protection | 12.1.6:mp7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References