First published: Mon Jun 26 2017(Updated: )
The Symantec Messaging Gateway, when processing a specific email attachment, can allow a malformed or corrupted Word file with a potentially malicious macro through despite the administrator having the 'disarm' functionality enabled. This constitutes a 'bypass' of the disarm functionality resident to the application.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Symantec Messaging Gateway | <=10.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6324 is considered a medium severity vulnerability due to its potential to bypass security measures.
To fix CVE-2017-6324, update to a version of Symantec Messaging Gateway that is higher than 10.6.2 to ensure proper handling of malicious attachments.
CVE-2017-6324 is a bypass vulnerability that affects the disarm functionality of the Symantec Messaging Gateway.
The disarm functionality in the Symantec Messaging Gateway is intended to neutralize potentially harmful macros in email attachments, which CVE-2017-6324 circumvents.
CVE-2017-6324 affects all versions of Symantec Messaging Gateway up to and including version 10.6.2.