![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.105444 |
Categoría: | CISCO |
Título: | Cisco Email Security Appliance Anti-Spam Scanner Bypass Vulnerability |
Resumen: | Cisco Email Security Appliance contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions. |
Descripción: | Summary: Cisco Email Security Appliance contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions. Vulnerability Insight: The vulnerability is due to improper handling of a malformed packet in the anti-spam scanner. An attacker could exploit this vulnerability by sending a crafted DNS Sender Policy Framework (SPF) text record. An exploit could allow the attacker to bypass the anti-spam scanner and generate a malformed packet alert. Affected Software/OS: See Vendor advisory. Solution: See Vendor advisory. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-4184 BugTraq ID: 75181 http://www.securityfocus.com/bid/75181 Cisco Security Advisory: 20150612 Cisco Email Security Appliance Anti-Spam Scanner Bypass Vulnerability http://tools.cisco.com/security/center/viewAlert.x?alertId=39339 http://www.securitytracker.com/id/1032582 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |