ID

VAR-201606-0287


CVE

CVE-2016-1438


TITLE

Cisco E Email Security The appliance Run on device AsyncOS Vulnerable to spam filtering

Trust: 0.8

sources: JVNDB: JVNDB-2016-003323

DESCRIPTION

Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers to bypass intended spam filtering via crafted executable content in a ZIP archive, aka Bug ID CSCuy39210. Vendors have confirmed this vulnerability Bug ID CSCuy39210 It is released as. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlBy a third party ZIP Spam filtering can be bypassed through the crafted and crafted content of the archive. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions

Trust: 2.52

sources: NVD: CVE-2016-1438 // JVNDB: JVNDB-2016-003323 // CNVD: CNVD-2016-04304 // BID: 91371 // VULHUB: VHN-90257

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-04304

AFFECTED PRODUCTS

vendor:ciscomodel:asyncosscope:eqversion:9.7.0-125

Trust: 2.4

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:email security appliancescope:eqversion:9.7.0-125

Trust: 0.6

sources: CNVD: CNVD-2016-04304 // JVNDB: JVNDB-2016-003323 // CNNVD: CNNVD-201606-503 // NVD: CVE-2016-1438

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1438
value: HIGH

Trust: 1.0

NVD: CVE-2016-1438
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-04304
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201606-503
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90257
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1438
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-04304
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90257
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1438
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-04304 // VULHUB: VHN-90257 // JVNDB: JVNDB-2016-003323 // CNNVD: CNNVD-201606-503 // NVD: CVE-2016-1438

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-254

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-90257 // JVNDB: JVNDB-2016-003323 // NVD: CVE-2016-1438

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201606-503

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201606-503

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-003323

PATCH

title:cisco-sa-20160622-esaurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa

Trust: 0.8

sources: JVNDB: JVNDB-2016-003323

EXTERNAL IDS

db:NVDid:CVE-2016-1438

Trust: 3.4

db:SECTRACKid:1036156

Trust: 1.1

db:JVNDBid:JVNDB-2016-003323

Trust: 0.8

db:CNVDid:CNVD-2016-04304

Trust: 0.6

db:CNNVDid:CNNVD-201606-503

Trust: 0.6

db:BIDid:91371

Trust: 0.4

db:VULHUBid:VHN-90257

Trust: 0.1

sources: CNVD: CNVD-2016-04304 // VULHUB: VHN-90257 // BID: 91371 // JVNDB: JVNDB-2016-003323 // CNNVD: CNNVD-201606-503 // NVD: CVE-2016-1438

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160622-esa

Trust: 2.6

url:http://www.securitytracker.com/id/1036156

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1438

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1438

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-04304 // VULHUB: VHN-90257 // BID: 91371 // JVNDB: JVNDB-2016-003323 // CNNVD: CNNVD-201606-503 // NVD: CVE-2016-1438

CREDITS

Cisco

Trust: 0.3

sources: BID: 91371

SOURCES

db:CNVDid:CNVD-2016-04304
db:VULHUBid:VHN-90257
db:BIDid:91371
db:JVNDBid:JVNDB-2016-003323
db:CNNVDid:CNNVD-201606-503
db:NVDid:CVE-2016-1438

LAST UPDATE DATE

2024-11-23T22:13:18.397000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-04304date:2016-06-24T00:00:00
db:VULHUBid:VHN-90257date:2018-10-30T00:00:00
db:BIDid:91371date:2016-06-22T00:00:00
db:JVNDBid:JVNDB-2016-003323date:2016-06-24T00:00:00
db:CNNVDid:CNNVD-201606-503date:2016-06-23T00:00:00
db:NVDid:CVE-2016-1438date:2024-11-21T02:46:26.630

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-04304date:2016-06-24T00:00:00
db:VULHUBid:VHN-90257date:2016-06-23T00:00:00
db:BIDid:91371date:2016-06-22T00:00:00
db:JVNDBid:JVNDB-2016-003323date:2016-06-24T00:00:00
db:CNNVDid:CNNVD-201606-503date:2016-06-23T00:00:00
db:NVDid:CVE-2016-1438date:2016-06-23T00:59:07.037