SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Email Security Appliance Vendors:   Cisco
Cisco Email Security Appliance HTTP Request Processing Flaw Lets Remote Users Overwrite Memory and Deny Service
SecurityTracker Alert ID:  1033531
SecurityTracker URL:  http://securitytracker.com/id/1033531
CVE Reference:   CVE-2015-6285   (Links to External Site)
Date:  Sep 10 2015
Impact:   Denial of service via network, Modification of system information, Modification of user information
Vendor Confirmed:  Yes  
Version(s): 7.6.0, 8.0.0; possibly other versions
Description:   A vulnerability was reported in Cisco Email Security Appliance. A remote user can overwrite memory on the target system. A remote user can cause denial of service conditions on the target system.

A remote user can send specially crafted HTTP requests to trigger an input validation flaw to overwrite portions of memory and affect the integrity of data and services on the target device.

The vendor has assigned bug ID CSCug21497 to this vulnerability.

Impact:   A remote user can overwrite memory on the target system.

A remote user can cause denial of service conditions.

Solution:   No solution was available at the time of this entry.

The Cisco advisory is available at:

http://tools.cisco.com/security/center/viewAlert.x?alertId=40844

Vendor URL:  tools.cisco.com/security/center/viewAlert.x?alertId=40844 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC