CVE-2016-6593

Published on: 01/08/2020 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:12 PM UTC

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of Vip Access Desktop from Symantec contain the following vulnerability:

A code-execution vulnerability exists during startup in jhi.dll and otpiha.dll in Symantec VIP Access Desktop before 2.2.2, which could let local malicious users execute arbitrary code.

  • CVE-2016-6593 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: Symantec - VIP Access Desktop version before 2.2.2

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 4.4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Symantec VIP Access Desktop Arbitrary DLL Execution Vendor Advisory
support.symantec.com
text/html
URL Logo CONFIRM support.symantec.com/us/en/article.symsa1388.html
SecurityFocus Third Party Advisory
VDB Entry
www.securityfocus.com
text/html
URL Logo MISC www.securityfocus.com/archive/1/539889/100/0/threaded
Symantec VIP Access Arbitrary DLL Execution ≈ Packet Storm Exploit
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/140098/Symantec-VIP-Access-Arbitrary-DLL-Execution.html
Symantec VIP Access Desktop DLL Loading CVE-2016-6593 Local Code Execution Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 94731

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationSymantecVip Access DesktopAllAllAllAll
ApplicationSymantecVip Access DesktopAllAllAllAll
  • cpe:2.3:a:symantec:vip_access_desktop:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:symantec:vip_access_desktop:*:*:*:*:*:*:*:*: