Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.140025
Categoría:CISCO
Título:Cisco Email Security Appliance Drop Bypass Vulnerability
Resumen:A vulnerability in the configured security policies, including drop email filtering, in Cisco; AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to; bypass a configured drop filter by using an email with a corrupted attachment.;; The vulnerability is due to improper error handling. An attacker could exploit this vulnerability by; sending an email message with a corrupted attachment. A successful exploit could allow the attacker; to bypass a configured drop filter.;; Cisco has released software updates that address this vulnerability. There are no workarounds that; address this vulnerability.
Descripción:Summary:
A vulnerability in the configured security policies, including drop email filtering, in Cisco
AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to
bypass a configured drop filter by using an email with a corrupted attachment.

The vulnerability is due to improper error handling. An attacker could exploit this vulnerability by
sending an email message with a corrupted attachment. A successful exploit could allow the attacker
to bypass a configured drop filter.

Cisco has released software updates that address this vulnerability. There are no workarounds that
address this vulnerability.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-6357
BugTraq ID: 93909
http://www.securityfocus.com/bid/93909
http://www.securitytracker.com/id/1037114
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.