A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits.
The vulnerability is due to improper input validation of user-supplied fields when logging in using FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted device and crafting user-supplied parameters. An exploit could allow the attacker to cause a partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact other user traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2eGvpUC A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits.
The vulnerability is due to improper input validation of user-supplied fields when logging in using FTP. An attacker could exploit this vulnerability by opening an FTP connection to the targeted device and crafting user-supplied parameters. An exploit could allow the attacker to cause a partial DoS condition when the FTP process unexpectedly quits. This vulnerability does not impact other user traffic.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2eGvpUC
Security Impact Rating: Medium
CVE: CVE-2016-6358
from Cisco Security Advisory http://ift.tt/2eGvpUC
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.