Denial of service in Cisco AsyncOS for Cisco Email Security Appliance and Cisco Email Security Appliance - CVE-2016-6356
Published: October 27, 2016 / Updated: April 5, 2018
Vulnerability identifier: #VU1079
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-6356
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco AsyncOS for Cisco Email Security Appliance
Cisco Email Security Appliance
Cisco AsyncOS for Cisco Email Security Appliance
Cisco Email Security Appliance
Detailed vulnerability description
The vulnerability allows a remote unauthenticated user to cause the target system to cease forward messages.
The weakness is due to insufficient validation of input data. By sending an email message with specially crafted attachment fields, attackers can trigger message filtering to crash and restart, making message scan and forward impossible.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
The weakness is due to insufficient validation of input data. By sending an email message with specially crafted attachment fields, attackers can trigger message filtering to crash and restart, making message scan and forward impossible.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
How to mitigate CVE-2016-6356
Update to version 9.1.1-038, 9.7.2-047, 10.0.0-125.