CVE-2016-1315

The proxy engine in Cisco Advanced Malware Protection (AMP), when used with Email Security Appliance (ESA) 9.5.0-201, 9.6.0-051, and 9.7.0-125, allows remote attackers to bypass intended content restrictions via a malformed e-mail message containing an encoded file, aka Bug ID CSCux45338.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:cisco:email_security_appliance_firmeware:9.1.0-032:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.5.0-201:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.6.0-051:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-125:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmeware:9.7.0-782:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaamp - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160211-esaamp - Vendor Advisory
References () http://www.securitytracker.com/id/1035008 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035008 - Third Party Advisory, VDB Entry

Information

Published : 2016-02-12 01:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1315

Mitre link : CVE-2016-1315

CVE.ORG link : CVE-2016-1315


JSON object : View

Products Affected

cisco

  • email_security_appliance_firmeware
CWE
CWE-284

Improper Access Control