First published: Tue Mar 14 2017(Updated: )
Improper control of generation of code vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to execute arbitrary code via a crafted HTTP request parameter.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Virusscan Enterprise | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8020 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2016-8020, upgrade Intel Security VirusScan Enterprise Linux to a version higher than 2.0.3.
CVE-2016-8020 affects users of Intel Security VirusScan Enterprise Linux version 2.0.3 and earlier.
CVE-2016-8020 is an improper control of generation of code vulnerability that could allow arbitrary code execution.
Yes, CVE-2016-8020 can be exploited remotely by authenticated users through crafted HTTP requests.