First published: Thu Nov 12 2015(Updated: )
Untrusted search path vulnerability in the client in Symantec Endpoint Protection (SEP) 12.1 before 12.1-RU6-MP3 allows local users to gain privileges via a Trojan horse DLL in a client install package. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1492.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection | <=12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8113 has a medium severity level due to its potential for privilege escalation.
To fix CVE-2015-8113, it is recommended to update Symantec Endpoint Protection to version 12.1-RU6-MP3 or later.
CVE-2015-8113 affects local users of Symantec Endpoint Protection versions prior to 12.1-RU6-MP3.
CVE-2015-8113 is caused by an untrusted search path vulnerability due to an incomplete fix for a previous vulnerability.
All versions of Symantec Endpoint Protection prior to 12.1-RU6-MP3 are vulnerable to CVE-2015-8113.