First published: Fri Aug 11 2017(Updated: )
The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.
Credit: secure@symantec.com secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Messaging Gateway for Service Providers | ||
Symantec Brightmail and Messaging Gateway | <10.6.3-267 | |
Symantec Brightmail and Messaging Gateway | <=10.6.3-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6327 is rated as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2017-6327, upgrade Symantec Messaging Gateway to version 10.6.3-267 or later.
The potential impacts of CVE-2017-6327 include unauthorized remote execution of commands which can lead to data breaches.
CVE-2017-6327 affects all versions of Symantec Messaging Gateway prior to 10.6.3-267.
There are no effective workarounds for CVE-2017-6327, so upgrading is the recommended action.