Improper input validation - CVE-2016-1438
Published: June 27, 2016 / Updated: November 22, 2018
Vulnerability identifier: #VU31
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-1438
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass anti-spam filtering on the target system.
The vulnerability exists due to improper handling of content in .zip files. A remote unauthenticated attacker can cause this weakness by creating a specially crafted 'zip' archive that will bypass the anti-spam filtering on the target system.
The vendor has assigned bug ID CSCuy39210 to this vulnerability.
Successful exploitation of this vulnerability may result in Host/resource access via network.
The vulnerability exists due to improper handling of content in .zip files. A remote unauthenticated attacker can cause this weakness by creating a specially crafted 'zip' archive that will bypass the anti-spam filtering on the target system.
The vendor has assigned bug ID CSCuy39210 to this vulnerability.
Successful exploitation of this vulnerability may result in Host/resource access via network.
How to mitigate CVE-2016-1438
Install update from vendor's website.