Cisco AsyncOS on Email Security Appliance (ESA) devices through 9.7.0-125 allows remote attackers to bypass malware detection via a crafted attachment in an e-mail message, aka Bug ID CSCuz14932.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory |
http://www.securityfocus.com/bid/92155 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036470 | Broken Link Third Party Advisory VDB Entry |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa | Vendor Advisory |
http://www.securityfocus.com/bid/92155 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036470 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-esa - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/92155 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1036470 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2016-08-01 02:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1461
Mitre link : CVE-2016-1461
CVE.ORG link : CVE-2016-1461
JSON object : View
Products Affected
cisco
- email_security_appliance
- asyncos
CWE
CWE-20
Improper Input Validation