CWE
125
Advisory Published
Updated

CVE-2016-5309

First published: Fri Apr 14 2017(Updated: )

The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression.

Credit: secure@symantec.com

Affected SoftwareAffected VersionHow to fix
Broadcom Symantec Data Center Security
Symantec Advanced Threat Protection
Symantec CSAPI<=10.0.4
Symantec Email Security.Cloud
Symantec Endpoint Protection<=12.1.4
Symantec Endpoint Protection<=12.1.6
Symantec Endpoint Protection<=12.1.6
Symantec Endpoint Protection Cloud Mac
Symantec Endpoint Protection Cloud
Symantec Endpoint Protection<=12.1
Symantec Endpoint Protection
Symantec Mail Security for Domino<=8.0.9
Symantec Mail Security for Domino=8.1.2
Symantec Mail Security for Domino=8.1.3
Symantec Mail Security for Microsoft Exchange<=6.5.8
Symantec Mail Security for Microsoft Exchange=7.0
Symantec Mail Security for Microsoft Exchange=7.0.1
Symantec Mail Security for Microsoft Exchange=7.0.2
Symantec Mail Security for Microsoft Exchange=7.0.3
Symantec Mail Security for Microsoft Exchange=7.0.4
Symantec Mail Security for Microsoft Exchange=7.5
Symantec Mail Security for Microsoft Exchange=7.5.1
Symantec Mail Security for Microsoft Exchange=7.5.2
Symantec Mail Security for Microsoft Exchange=7.5.3
Symantec Mail Security for Microsoft Exchange=7.5.4
Broadcom Symantec Messaging Gateway<=10.6.1
Symantec Messaging Gateway for Service Providers=10.5
Symantec Messaging Gateway for Service Providers=10.6
Symantec Protection Engine<=7.0.5
Symantec Protection Engine=7.5.0
Symantec Protection Engine=7.5.1
Symantec Protection Engine=7.5.2
Symantec Protection Engine=7.5.3
Symantec Protection Engine=7.5.4
Symantec Protection Engine=7.5.5
Symantec Protection Engine=7.8.0
Symantec Protection for SharePoint Servers=6.0.3
Symantec Protection for SharePoint Servers=6.0.4
Symantec Protection for SharePoint Servers=6.0.5
Symantec Protection for SharePoint Servers=6.0.6
Symantec Protection for SharePoint Servers=6.0.7
Symantec Web Gateway
Symantec Web Security.Cloud

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-5309?

    CVE-2016-5309 has been classified as a high severity vulnerability due to its potential to allow remote code execution.

  • How do I fix CVE-2016-5309?

    To mitigate CVE-2016-5309, ensure you update Symantec products to versions that are 12.1.6 MP5 or later.

  • Which products are affected by CVE-2016-5309?

    CVE-2016-5309 affects several Symantec products including Symantec Endpoint Protection and Symantec Advanced Threat Protection.

  • Can CVE-2016-5309 be exploited remotely?

    Yes, CVE-2016-5309 can be exploited remotely through malformed RAR files.

  • What type of vulnerability is CVE-2016-5309 categorized as?

    CVE-2016-5309 is categorized as a remote code execution vulnerability due to flaws in the RAR file parser.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203