Merge branch 'cna/symantec/sa155'

This commit is contained in:
CVE Team 2018-01-09 20:05:53 -05:00
commit a946284a9c
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
4 changed files with 247 additions and 12 deletions

View File

@ -1,8 +1,38 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "secure@symantec.com",
"DATE_PUBLIC" : "2018-01-09T00:00:00",
"ID" : "CVE-2016-10256",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ProxySG",
"version" : {
"version_data" : [
{
"version_value" : "6.5 prior to 6.5.10.6"
},
{
"version_value" : "6.6"
},
{
"version_value" : "6.7 prior to 6.7.2.1"
}
]
}
}
]
},
"vendor_name" : "Symantec Corporation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +41,26 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "The Symantec ProxySG 6.5 (prior to 6.5.10.6), 6.6, and 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10257."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Reflected XSS"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.symantec.com/security-center/network-protection-security-advisories/SA155"
}
]
}

View File

@ -1,8 +1,51 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "secure@symantec.com",
"DATE_PUBLIC" : "2018-01-09T00:00:00",
"ID" : "CVE-2016-10257",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ASG",
"version" : {
"version_data" : [
{
"version_value" : "6.6"
},
{
"version_value" : "6.7 prior to 6.7.2.1"
}
]
}
},
{
"product_name" : "ProxySG",
"version" : {
"version_data" : [
{
"version_value" : "6.5 prior to 6.5.10.6"
},
{
"version_value" : "6.6"
},
{
"version_value" : "6.7 prior to 6.7.2.1"
}
]
}
}
]
},
"vendor_name" : "Symantec Corporation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +54,26 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Reflected XSS"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.symantec.com/security-center/network-protection-security-advisories/SA155"
}
]
}

View File

@ -1,8 +1,51 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "secure@symantec.com",
"DATE_PUBLIC" : "2018-01-09T00:00:00",
"ID" : "CVE-2016-9099",
"STATE" : "REJECT"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ASG",
"version" : {
"version_data" : [
{
"version_value" : "6.6"
},
{
"version_value" : "6.7 prior to 6.7.2.1"
}
]
}
},
{
"product_name" : "ProxySG",
"version" : {
"version_data" : [
{
"version_value" : "6.5 prior to 6.5.10.6"
},
{
"version_value" : "6.6"
},
{
"version_value" : "6.7 prior to 6.7.2.1"
}
]
}
}
]
},
"vendor_name" : "Symantec Corporation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +54,26 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
"value" : "Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 prior to 6.7.2.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6, and ProxySG 6.7 prior to 6.7.2.1 are susceptible to an open redirection vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to redirect the target user to a malicious web site."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Open redirection"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.symantec.com/security-center/network-protection-security-advisories/SA155"
}
]
}

View File

@ -1,8 +1,51 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER" : "secure@symantec.com",
"DATE_PUBLIC" : "2018-01-09T00:00:00",
"ID" : "CVE-2016-9100",
"STATE" : "REJECT"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "ASG",
"version" : {
"version_data" : [
{
"version_value" : "6.6 prior to 6.6.5.13"
},
{
"version_value" : "6.7 prior to 6.7.3.1"
}
]
}
},
{
"product_name" : "ProxySG",
"version" : {
"version_data" : [
{
"version_value" : "6.5 prior to 6.5.10.6"
},
{
"version_value" : "6.6 prior to 6.6.5.13"
},
{
"version_value" : "6.7 prior to 6.7.3.1"
}
]
}
}
]
},
"vendor_name" : "Symantec Corporation"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +54,26 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
"value" : "Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.13, ASG 6.7 prior to 6.7.3.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6 prior to 6.6.5.13, and ProxySG 6.7 prior to 6.7.3.1 are susceptible to an information disclosure vulnerability. An attacker with local access to the client host of an authenticated administrator user can, under certain circumstances, obtain sensitive authentication credential information."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.symantec.com/security-center/network-protection-security-advisories/SA155"
}
]
}