Description
Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-8869 | Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file. |
References
History
No history.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-06T02:13:21.653Z
Reserved: 2016-09-09T00:00:00.000Z
Link: CVE-2016-8021
No data.
Status : Modified
Published: 2017-03-14T22:59:01.023
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-8021
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD