CWE
787
Advisory Published
Updated

CVE-2016-5310

First published: Fri Apr 14 2017(Updated: )

The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression.

Credit: secure@symantec.com

Affected SoftwareAffected VersionHow to fix
Broadcom Symantec Data Center Security
Symantec Advanced Threat Protection
Symantec CSAPI<=10.0.4
Symantec Email Security.Cloud
Symantec Endpoint Protection<=12.1.4
Symantec Endpoint Protection<=12.1.6
Symantec Endpoint Protection<=12.1.6
Symantec Endpoint Protection Cloud Mac
Symantec Endpoint Protection Cloud
Symantec Endpoint Protection<=12.1
Symantec Endpoint Protection
Symantec Mail Security for Domino<=8.0.9
Symantec Mail Security for Domino=8.1.2
Symantec Mail Security for Domino=8.1.3
Symantec Mail Security for Microsoft Exchange<=6.5.8
Symantec Mail Security for Microsoft Exchange=7.0
Symantec Mail Security for Microsoft Exchange=7.0.1
Symantec Mail Security for Microsoft Exchange=7.0.2
Symantec Mail Security for Microsoft Exchange=7.0.3
Symantec Mail Security for Microsoft Exchange=7.0.4
Symantec Mail Security for Microsoft Exchange=7.5
Symantec Mail Security for Microsoft Exchange=7.5.1
Symantec Mail Security for Microsoft Exchange=7.5.2
Symantec Mail Security for Microsoft Exchange=7.5.3
Symantec Mail Security for Microsoft Exchange=7.5.4
Broadcom Symantec Messaging Gateway<=10.6.1
Symantec Messaging Gateway for Service Providers=10.5
Symantec Messaging Gateway for Service Providers=10.6
Symantec Protection Engine<=7.0.5
Symantec Protection Engine=7.5.0
Symantec Protection Engine=7.5.1
Symantec Protection Engine=7.5.2
Symantec Protection Engine=7.5.3
Symantec Protection Engine=7.5.4
Symantec Protection Engine=7.5.5
Symantec Protection Engine=7.8.0
Symantec Protection for SharePoint Servers=6.0.3
Symantec Protection for SharePoint Servers=6.0.4
Symantec Protection for SharePoint Servers=6.0.5
Symantec Protection for SharePoint Servers=6.0.6
Symantec Protection for SharePoint Servers=6.0.7
Symantec Web Gateway
Symantec Web Security.Cloud

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-5310?

    CVE-2016-5310 is classified as a medium severity vulnerability.

  • How do I fix CVE-2016-5310?

    To remediate CVE-2016-5310, upgrade affected Symantec products to the versions mentioned in the advisory.

  • Which products are affected by CVE-2016-5310?

    CVE-2016-5310 affects multiple Symantec products including Symantec Endpoint Protection and Symantec Advanced Threat Protection.

  • What type of vulnerability is CVE-2016-5310?

    CVE-2016-5310 is a vulnerability in the RAR file parser of the AntiVirus Decomposer engine.

  • Can CVE-2016-5310 be exploited remotely?

    Yes, CVE-2016-5310 can potentially be exploited remotely by processing a malicious RAR file.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203