[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115228

 
 

909

 
 

90132

 
 

140

Paid content will be excluded from the download.


Download | Alert*
OVAL

Tamper protection bypass vulnerability in Symantec Endpoint Protection Client

ID: oval:org.secpod.oval:def:47282Date: (C)2018-09-03   (M)2018-10-29
Class: VULNERABILITYFamily: windows




The host is installed with Symantec Endpoint Protection (SEP) Client through 12.1 RU6 MP9 and is prone to a tamper protection bypass. A flaw is present in the application, which fails to handle text alteration in a UI element. Successful exploitation could allow attackers to bypass tamper-protection.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows Server 2016
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows Server 2012 R2
Product:
Symantec Endpoint Protection Client
Reference:
CVE-2017-6331
CVE    1
CVE-2017-6331
CPE    41
cpe:/a:symantec:endpoint_protection:12.1.1
cpe:/a:symantec:endpoint_protection:12.1.2
cpe:/a:symantec:endpoint_protection:12.1.3
cpe:/a:symantec:endpoint_protection:12.1.4
...

© SecPod Technologies