Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.106594
Categoría:CISCO
Título:Cisco AsyncOS Software for Cisco ESA Filtering Bypass Vulnerability
Resumen:A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner;of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote;attacker to bypass configured user filters on the device.
Descripción:Summary:
A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner
of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote
attacker to bypass configured user filters on the device.

Vulnerability Insight:
The vulnerability is due to improper error handling of a malformed MIME
header in an email attachment. An attacker could exploit this vulnerability by sending an email with a crafted
MIME attachment.

Vulnerability Impact:
A successful exploit could allow the attacker to bypass user filters
configured to prevent executable files from being opened. The malformed MIME headers may not be RFC compliant but
some mail clients could still allow users to access the attachment, which may not have been properly filtered by
the device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-3827
BugTraq ID: 96239
http://www.securityfocus.com/bid/96239
http://www.securitytracker.com/id/1037831
http://www.securitytracker.com/id/1037832
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.