ID

VAR-201709-0678


CVE

CVE-2017-12215


TITLE

Cisco Email Security Appliance for AsyncOS Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-008414

DESCRIPTION

A vulnerability in the email message filtering feature of Cisco AsyncOS Software for the Cisco Email Security Appliance could allow an unauthenticated, remote attacker to cause an affected device to run out of memory and stop scanning and forwarding email messages. When system memory is depleted, it can cause the filtering process to crash, resulting in a denial of service (DoS) condition on the device. This vulnerability affects software version 9.0 through the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. The vulnerability is not limited to any specific rules or actions for a message filter or content filter. Cisco Bug IDs: CSCvd29354. Vendors have confirmed this vulnerability Bug ID CSCvd29354 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOS Software is the operating system used in it. The following releases are affected: Cisco AsyncOS Software Release 9.0, Release 9.1, Release 9.6, Release 9.7, Release 9.8, Release 10.0

Trust: 2.07

sources: NVD: CVE-2017-12215 // JVNDB: JVNDB-2017-008414 // BID: 100920 // VULHUB: VHN-102715 // VULMON: CVE-2017-12215

AFFECTED PRODUCTS

vendor:ciscomodel:asyncosscope:eqversion:9.7

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.5

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.1

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.1.2

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.6

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.8

Trust: 1.6

vendor:ciscomodel:asyncosscope:eqversion:9.0

Trust: 1.6

vendor:ciscomodel:asyncosscope: - version: -

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:ironport messaging gateway appliancescope:eqversion:x10709.7.2-065

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:9.7.2-065

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:9.7.1-066

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:10.0.1-087

Trust: 0.3

vendor:ciscomodel:email security appliancescope:eqversion:10.0.0-203

Trust: 0.3

vendor:ciscomodel:asyncos softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:9.8.1-015

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.0.0-264

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:10.0.2-020

Trust: 0.3

sources: BID: 100920 // JVNDB: JVNDB-2017-008414 // CNNVD: CNNVD-201709-1039 // NVD: CVE-2017-12215

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12215
value: HIGH

Trust: 1.0

NVD: CVE-2017-12215
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201709-1039
value: HIGH

Trust: 0.6

VULHUB: VHN-102715
value: HIGH

Trust: 0.1

VULMON: CVE-2017-12215
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12215
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-102715
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12215
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.5
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102715 // VULMON: CVE-2017-12215 // JVNDB: JVNDB-2017-008414 // CNNVD: CNNVD-201709-1039 // NVD: CVE-2017-12215

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-102715 // JVNDB: JVNDB-2017-008414 // NVD: CVE-2017-12215

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201709-1039

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201709-1039

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008414

PATCH

title:cisco-sa-20170920-esaurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-esa

Trust: 0.8

title:Cisco Email Security Appliance AsyncOS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75053

Trust: 0.6

title:Cisco: Cisco Email Security Appliance Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20170920-esa

Trust: 0.1

sources: VULMON: CVE-2017-12215 // JVNDB: JVNDB-2017-008414 // CNNVD: CNNVD-201709-1039

EXTERNAL IDS

db:NVDid:CVE-2017-12215

Trust: 2.9

db:BIDid:100920

Trust: 2.1

db:SECTRACKid:1039414

Trust: 1.8

db:JVNDBid:JVNDB-2017-008414

Trust: 0.8

db:CNNVDid:CNNVD-201709-1039

Trust: 0.7

db:VULHUBid:VHN-102715

Trust: 0.1

db:VULMONid:CVE-2017-12215

Trust: 0.1

sources: VULHUB: VHN-102715 // VULMON: CVE-2017-12215 // BID: 100920 // JVNDB: JVNDB-2017-008414 // CNNVD: CNNVD-201709-1039 // NVD: CVE-2017-12215

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170920-esa

Trust: 2.2

url:http://www.securityfocus.com/bid/100920

Trust: 1.9

url:http://www.securitytracker.com/id/1039414

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12215

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12215

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-102715 // VULMON: CVE-2017-12215 // BID: 100920 // JVNDB: JVNDB-2017-008414 // CNNVD: CNNVD-201709-1039 // NVD: CVE-2017-12215

CREDITS

Cisco

Trust: 0.3

sources: BID: 100920

SOURCES

db:VULHUBid:VHN-102715
db:VULMONid:CVE-2017-12215
db:BIDid:100920
db:JVNDBid:JVNDB-2017-008414
db:CNNVDid:CNNVD-201709-1039
db:NVDid:CVE-2017-12215

LAST UPDATE DATE

2024-11-23T22:52:22.260000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102715date:2019-10-09T00:00:00
db:VULMONid:CVE-2017-12215date:2019-10-09T00:00:00
db:BIDid:100920date:2017-09-20T00:00:00
db:JVNDBid:JVNDB-2017-008414date:2017-10-18T00:00:00
db:CNNVDid:CNNVD-201709-1039date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12215date:2024-11-21T03:09:03.067

SOURCES RELEASE DATE

db:VULHUBid:VHN-102715date:2017-09-21T00:00:00
db:VULMONid:CVE-2017-12215date:2017-09-21T00:00:00
db:BIDid:100920date:2017-09-20T00:00:00
db:JVNDBid:JVNDB-2017-008414date:2017-10-18T00:00:00
db:CNNVDid:CNNVD-201709-1039date:2017-09-22T00:00:00
db:NVDid:CVE-2017-12215date:2017-09-21T05:29:00.277