ID

VAR-201901-0602


CVE

CVE-2018-15453


TITLE

Cisco Email Security Appliance Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013703

DESCRIPTION

A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA. Cisco Email Security Appliance (ESA) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOSSoftware is the operating system used in it. The vulnerability stems from the failure of the program to properly validate the S/MIME signed message. This issue is being tracked by Cisco Bug ID CSCvk73786. AsyncOS Software is a set of operating systems running on it. input verification

Trust: 2.52

sources: NVD: CVE-2018-15453 // JVNDB: JVNDB-2018-013703 // CNVD: CNVD-2019-01871 // BID: 106511 // VULHUB: VHN-125714

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-01871

AFFECTED PRODUCTS

vendor:ciscomodel:email security appliancescope:eqversion:11.1.0-131

Trust: 1.3

vendor:ciscomodel:email security appliancescope:eqversion:11.0.1-401

Trust: 1.0

vendor:ciscomodel:e email security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:email security appliance nonescope: - version: -

Trust: 0.6

vendor:ciscomodel:email security appliancescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.5.2-061

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.5.2-042

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.5.2

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.5.1-296

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.5.1

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.0.0-203

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.0.0-125

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.0.0-124

Trust: 0.3

vendor:ciscomodel:asyncosscope:eqversion:10.0

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:12.0.0-281

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.1.1-042

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.1.1-037

Trust: 0.3

vendor:ciscomodel:email security appliancescope:neversion:11.0.2-044

Trust: 0.3

sources: CNVD: CNVD-2019-01871 // BID: 106511 // JVNDB: JVNDB-2018-013703 // NVD: CVE-2018-15453

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15453
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2018-15453
value: HIGH

Trust: 1.0

NVD: CVE-2018-15453
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-01871
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201901-290
value: HIGH

Trust: 0.6

VULHUB: VHN-125714
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-15453
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-01871
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-125714
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2018-15453
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2018-15453
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2019-01871 // VULHUB: VHN-125714 // JVNDB: JVNDB-2018-013703 // CNNVD: CNNVD-201901-290 // NVD: CVE-2018-15453 // NVD: CVE-2018-15453

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-125714 // JVNDB: JVNDB-2018-013703 // NVD: CVE-2018-15453

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201901-290

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201901-290

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013703

PATCH

title:cisco-sa-20190109-esa-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos

Trust: 0.8

title:Patch for CiscoEmailSecurityApplianceS/MIME Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/150471

Trust: 0.6

title:Cisco Email Security Appliance AsyncOS Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88491

Trust: 0.6

sources: CNVD: CNVD-2019-01871 // JVNDB: JVNDB-2018-013703 // CNNVD: CNNVD-201901-290

EXTERNAL IDS

db:NVDid:CVE-2018-15453

Trust: 3.4

db:BIDid:106511

Trust: 2.6

db:JVNDBid:JVNDB-2018-013703

Trust: 0.8

db:CNNVDid:CNNVD-201901-290

Trust: 0.7

db:CNVDid:CNVD-2019-01871

Trust: 0.6

db:VULHUBid:VHN-125714

Trust: 0.1

sources: CNVD: CNVD-2019-01871 // VULHUB: VHN-125714 // BID: 106511 // JVNDB: JVNDB-2018-013703 // CNNVD: CNNVD-201901-290 // NVD: CVE-2018-15453

REFERENCES

url:http://www.securityfocus.com/bid/106511

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190109-esa-dos

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15453

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15453

Trust: 0.8

url:http://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2019-01871 // VULHUB: VHN-125714 // BID: 106511 // JVNDB: JVNDB-2018-013703 // CNNVD: CNNVD-201901-290 // NVD: CVE-2018-15453

CREDITS

Cisco

Trust: 0.3

sources: BID: 106511

SOURCES

db:CNVDid:CNVD-2019-01871
db:VULHUBid:VHN-125714
db:BIDid:106511
db:JVNDBid:JVNDB-2018-013703
db:CNNVDid:CNNVD-201901-290
db:NVDid:CVE-2018-15453

LAST UPDATE DATE

2024-11-23T22:33:59.709000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-01871date:2019-01-17T00:00:00
db:VULHUBid:VHN-125714date:2020-09-16T00:00:00
db:BIDid:106511date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2018-013703date:2019-02-28T00:00:00
db:CNNVDid:CNNVD-201901-290date:2020-09-17T00:00:00
db:NVDid:CVE-2018-15453date:2024-11-21T03:50:50.217

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-01871date:2019-01-17T00:00:00
db:VULHUBid:VHN-125714date:2019-01-10T00:00:00
db:BIDid:106511date:2019-01-09T00:00:00
db:JVNDBid:JVNDB-2018-013703date:2019-02-28T00:00:00
db:CNNVDid:CNNVD-201901-290date:2019-01-10T00:00:00
db:NVDid:CVE-2018-15453date:2019-01-10T18:29:00.500