Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cisco Email Security Appliance Memory Corruption Denial of Service Vulnerability
Vulnerability Description
A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA.
CVSS Information
N/A
Vulnerability Type
输入验证不恰当
Vulnerability Title
Cisco Email Security Appliance AsyncOS Software 缓冲区错误漏洞
Vulnerability Description
Cisco Email Security Appliance(ESA)是美国思科(Cisco)公司的一个电子邮件安全设备。AsyncOS Software是运行在其中的一套操作系统。 Cisco ESA的AsyncOS Software中的Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification或S/MIME Public Key Harvesting功能存在缓冲区错误漏洞,该漏洞源于程序没有对S/M
CVSS Information
N/A
Vulnerability Type
N/A