Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105743
Category:CISCO
Title:Cisco Email Security Appliance AMP ClamAV Denial of Service Vulnerability
Summary:A vulnerability in the Clam AntiVirus (ClamAV) software that is used by Cisco Advance Malware Protection (AMP) for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause the AMP process to restart.
Description:Summary:
A vulnerability in the Clam AntiVirus (ClamAV) software that is used by Cisco Advance Malware Protection (AMP) for Cisco Email Security Appliances (ESAs) could allow an unauthenticated, remote attacker to cause the AMP process to restart.

Vulnerability Insight:
The vulnerability is due to improper parsing of input files by the libclamav library. An attacker could exploit this vulnerability by sending a crafted document that triggers a scan from the AMP ClamAV library on an affected system. A successful exploit could allow the attacker to cause the AMP process to restart.

Affected Software/OS:
ESA 9.x < 9.7.0-125

Solution:
See Vendor advisory.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-1405
BugTraq ID: 90968
http://www.securityfocus.com/bid/90968
Cisco Security Advisory: 20160531 Cisco ESA and WSA AMP ClamAV Denial of Service Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160531-wsa-esa
https://github.com/vrtadmin/clamav-devel/blob/master/ChangeLog
http://www.securitytracker.com/id/1035993
http://www.securitytracker.com/id/1035994
http://www.ubuntu.com/usn/USN-3093-1
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.