![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.140024 |
Kategorie: | CISCO |
Titel: | Cisco Email Security Appliance FTP Denial of Service Vulnerability |
Zusammenfassung: | A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an; unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP; application unexpectedly quits.;; The vulnerability is due to improper input validation of user-supplied fields when logging in using; FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted; device and crafting user-supplied parameters. An exploit could allow the attacker to cause a; partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact; other user traffic.;; Cisco has released software updates that address this vulnerability. There are no workarounds that; address this vulnerability. |
Beschreibung: | Summary: A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. The vulnerability is due to improper input validation of user-supplied fields when logging in using FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted device and crafting user-supplied parameters. An exploit could allow the attacker to cause a partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact other user traffic. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6358 BugTraq ID: 93905 http://www.securityfocus.com/bid/93905 http://www.securitytracker.com/id/1037115 |
Copyright | Copyright (C) 2016 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |