A vulnerability in the configured security policies, including drop email filtering, in Cisco AsyncOS for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass a configured drop filter by using an email with a corrupted attachment. More Information: CSCuz01651. Known Affected Releases: 10.0.9-015 9.7.1-066 9.9.6-026.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93909 - | |
References | () http://www.securitytracker.com/id/1037114 - | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa5 - Vendor Advisory |
Information
Published : 2016-10-28 10:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6357
Mitre link : CVE-2016-6357
CVE.ORG link : CVE-2016-6357
JSON object : View
Products Affected
cisco
- email_security_appliance
CWE
CWE-388
7PK - Errors