8.8
CVSSv3

CVE-2017-6327

Published: 11/08/2017 Updated: 03/10/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The Symantec Messaging Gateway prior to 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

symantec message gateway

Exploits

This is an advisory for CVE-2017-6327 which is an unauthenticated remote code execution flaw in the web interface of Symantec Messaging Gateway prior to and including version 1063-2, which can be used to execute commands as root Symantec Messaging Gateway, formerly known as Brightmail, is a linux-based anti-spam/security product for e-mail serv ...
Symantec Messaging Gateway versions 1063-2 and below suffer from an unauthenticated remote code execution vulnerability ...