First published: Wed Jun 28 2017(Updated: )
The Symantec Management Console prior to ITMS 8.1 RU1, ITMS 8.0_POST_HF6, and ITMS 7.6_POST_HF7 has an issue whereby XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Management Console | <8.1 | |
Symantec Management Console | =7.6-hf7 | |
Symantec Management Console | =8.0-hf6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6323 has a high severity rating due to its potential for data disclosure and denial of service.
To fix CVE-2017-6323, upgrade the Symantec Management Console to version 8.1 RU1 or later, or apply the appropriate patches for versions 7.6 HF7 and 8.0 HF6.
CVE-2017-6323 allows for attacks that may lead to unauthorized data disclosure and possible denial of service.
CVE-2017-6323 affects Symantec Management Console versions prior to 8.1 RU1, and specifically versions 8.0 HF6 and 7.6 HF7.
Yes, CVE-2017-6323 is related to vulnerabilities in XML processing due to a weakly configured XML parser.