CVE-2016-6358

Published on: 10/28/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Email Security Appliance from Cisco contain the following vulnerability:

A vulnerability in local FTP to the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition when the FTP application unexpectedly quits. More Information: CSCux68539. Known Affected Releases: 9.1.0-032 9.7.1-000. Known Fixed Releases: 9.1.1-038.

  • CVE-2016-6358 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Cisco Email Security Appliance FTP Input Validation Bug Lets Remote Users Cause the Target FTP Service to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1037115
Cisco Email Security Appliance CVE-2016-6358 Remote Denial of Service Vulnerability cve.report (archive)
text/html
URL Logo BID 93905
Cisco Email Security Appliance FTP Denial of Service Vulnerability Vendor Advisory
tools.cisco.com
text/html
URL Logo CONFIRM tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-esa6

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCiscoEmail Security Appliance9.7.1-066AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-046AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-047AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-054AllAllAll
ApplicationCiscoEmail Security Appliance9.9.6-026AllAllAll
ApplicationCiscoEmail Security Appliance9.9_baseAllAllAll
ApplicationCiscoEmail Security Appliance9.7.1-066AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-046AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-047AllAllAll
ApplicationCiscoEmail Security Appliance9.7.2-054AllAllAll
ApplicationCiscoEmail Security Appliance9.9.6-026AllAllAll
ApplicationCiscoEmail Security Appliance9.9_baseAllAllAll
  • cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-046:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-054:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.9_base:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.1-066:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-046:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-047:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.7.2-054:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.9.6-026:*:*:*:*:*:*:*:
  • cpe:2.3:a:cisco:email_security_appliance:9.9_base:*:*:*:*:*:*:*: