CVE-2016-1405

Published on: 06/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Email Security Appliance from Cisco contain the following vulnerability:

libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document, aka Bug IDs CSCuv78533 and CSCuw60503.

  • CVE-2016-1405 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Cisco Web Security Appliance Advance Malware Protection Bug Lets Remote Users Cause the Target Service to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035994
clamav-devel/ChangeLog at master · vrtadmin/clamav-devel · GitHub web.archive.org
text/html
Inactive LinkNot Archived
URL Logo MISC github.com/vrtadmin/clamav-devel/blob/master/ChangeLog
Multiple Cisco Products CVE-2016-1405 Remote Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 90968
Cisco Email Security Appliance Advance Malware Protection Bug Lets Remote Users Cause the Target Service to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035993
Cisco ESA and WSA AMP ClamAV Denial of Service Vulnerability Vendor Advisory
tools.cisco.com
text/html
URL Logo CISCO 20160531 Cisco ESA and WSA AMP ClamAV Denial of Service Vulnerability
USN-3093-1: ClamAV vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-3093-1

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoEmail Security Appliance9.6.0-042AllAllAll
ApplicationCiscoEmail Security Appliance9.6.0-042AllAllAll
ApplicationCiscoWeb Security Appliance8.8.0-085AllAllAll
ApplicationCiscoWeb Security Appliance9.1.0-070AllAllAll
ApplicationCiscoWeb Security Appliance9.5.0-284AllAllAll
ApplicationCiscoWeb Security Appliance8.8.0-085AllAllAll
ApplicationCiscoWeb Security Appliance9.1.0-070AllAllAll
ApplicationCiscoWeb Security Appliance9.5.0-284AllAllAll
ApplicationClamavClamavAllAllAllAll
ApplicationClamavClamavAllAllAllAll
  • cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*:
  • cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*: