ID

VAR-201610-0342


CVE

CVE-2016-1481


TITLE

Cisco ESA Run on device AsyncOS Service disruption in software email message filtering function (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-005646

DESCRIPTION

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.Affected Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter that contains certain rules. More Information: CSCux59873. Known Affected Releases: 8.5.6-106 9.1.0-032 9.7.0-125. Known Fixed Releases: 9.1.1-038 9.7.1-066. Vendors have confirmed this vulnerability Bug ID CSCux59873 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. The Cisco AsyncOS operating system is designed to enhance the security and performance of Cisco Email Security appliances. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCux59873. The following versions are affected: Cisco AsyncOS Software for Cisco ESA 8.5.6-106, 9.1.0-032, 9.7.0-125

Trust: 2.61

sources: NVD: CVE-2016-1481 // JVNDB: JVNDB-2016-005646 // CNVD: CNVD-2016-10393 // BID: 93908 // VULHUB: VHN-90300 // VULMON: CVE-2016-1481

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-10393

AFFECTED PRODUCTS

vendor:ciscomodel:email security appliancescope:eqversion:9.6.0-000

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.5.6-074

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.7.0-125

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.1.0

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.0.0

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.5.7-042

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.6.0-042

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.4.0

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.6.0-011

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:8.9.2-032

Trust: 1.6

vendor:ciscomodel:email security appliancescope:eqversion:9.1.0-011

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.6-052

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.1.0-032

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.9.1-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.6-106

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.0-er1-198

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.6-113

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.6.0

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.4.4-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.0-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.5.0-201

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.0.5-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.9.0

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:8.5.6-073

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.1.1-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.0.0-212

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.6.0-051

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.5.0-000

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.0.0-461

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion:9.1.0-101

Trust: 1.0

vendor:ciscomodel:asyncosscope: - version: -

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncos softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:8.0.2

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:8.0.1

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.6

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.5

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:8.5

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.7.0-204

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.7.0-132

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.7

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.6.3-027

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.5

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.1.5-026

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:7.1.3-010

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.0

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:9.7.2-065

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:9.7.1-066

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:9.1.2-041

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:9.1.1-038

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:10.0.0-203

Trust: 0.3

vendor:ciscomodel:asyncosscope:neversion:10.0.0-124

Trust: 0.3

sources: CNVD: CNVD-2016-10393 // BID: 93908 // JVNDB: JVNDB-2016-005646 // CNNVD: CNNVD-201610-752 // NVD: CVE-2016-1481

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1481
value: HIGH

Trust: 1.0

NVD: CVE-2016-1481
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-10393
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-752
value: HIGH

Trust: 0.6

VULHUB: VHN-90300
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1481
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1481
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-10393
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90300
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1481
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-10393 // VULHUB: VHN-90300 // VULMON: CVE-2016-1481 // JVNDB: JVNDB-2016-005646 // CNNVD: CNNVD-201610-752 // NVD: CVE-2016-1481

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-90300 // JVNDB: JVNDB-2016-005646 // NVD: CVE-2016-1481

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-752

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201610-752

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005646

PATCH

title:cisco-sa-20161026-esa1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa1

Trust: 0.8

title:Patch for CiscoAsyncOS Denial of Service Vulnerability (CNVD-2016-10393)url:https://www.cnvd.org.cn/patchInfo/show/83243

Trust: 0.6

title:Cisco AsyncOS for Cisco Email Security Appliances Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65108

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/

Trust: 0.1

sources: CNVD: CNVD-2016-10393 // VULMON: CVE-2016-1481 // JVNDB: JVNDB-2016-005646 // CNNVD: CNNVD-201610-752

EXTERNAL IDS

db:NVDid:CVE-2016-1481

Trust: 3.5

db:BIDid:93908

Trust: 2.7

db:SECTRACKid:1037123

Trust: 1.2

db:JVNDBid:JVNDB-2016-005646

Trust: 0.8

db:CNNVDid:CNNVD-201610-752

Trust: 0.7

db:CNVDid:CNVD-2016-10393

Trust: 0.6

db:VULHUBid:VHN-90300

Trust: 0.1

db:VULMONid:CVE-2016-1481

Trust: 0.1

sources: CNVD: CNVD-2016-10393 // VULHUB: VHN-90300 // VULMON: CVE-2016-1481 // BID: 93908 // JVNDB: JVNDB-2016-005646 // CNNVD: CNNVD-201610-752 // NVD: CVE-2016-1481

REFERENCES

url:http://www.securityfocus.com/bid/93908

Trust: 2.5

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161026-esa1

Trust: 2.1

url:http://www.securitytracker.com/id/1037123

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1481

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1481

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-patches-critical-vulnerability-in-facility-events-response-system/121626/

Trust: 0.1

sources: CNVD: CNVD-2016-10393 // VULHUB: VHN-90300 // VULMON: CVE-2016-1481 // BID: 93908 // JVNDB: JVNDB-2016-005646 // CNNVD: CNNVD-201610-752 // NVD: CVE-2016-1481

CREDITS

Cisco

Trust: 0.9

sources: BID: 93908 // CNNVD: CNNVD-201610-752

SOURCES

db:CNVDid:CNVD-2016-10393
db:VULHUBid:VHN-90300
db:VULMONid:CVE-2016-1481
db:BIDid:93908
db:JVNDBid:JVNDB-2016-005646
db:CNNVDid:CNNVD-201610-752
db:NVDid:CVE-2016-1481

LAST UPDATE DATE

2024-11-23T22:38:43.336000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-10393date:2016-10-31T00:00:00
db:VULHUBid:VHN-90300date:2017-07-29T00:00:00
db:VULMONid:CVE-2016-1481date:2017-07-29T00:00:00
db:BIDid:93908date:2016-11-24T00:04:00
db:JVNDBid:JVNDB-2016-005646date:2016-11-01T00:00:00
db:CNNVDid:CNNVD-201610-752date:2016-10-31T00:00:00
db:NVDid:CVE-2016-1481date:2024-11-21T02:46:31.353

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-10393date:2016-10-31T00:00:00
db:VULHUBid:VHN-90300date:2016-10-28T00:00:00
db:VULMONid:CVE-2016-1481date:2016-10-28T00:00:00
db:BIDid:93908date:2016-10-26T00:00:00
db:JVNDBid:JVNDB-2016-005646date:2016-11-01T00:00:00
db:CNNVDid:CNNVD-201610-752date:2016-10-28T00:00:00
db:NVDid:CVE-2016-1481date:2016-10-28T10:59:03.713