var-201506-0245
Vulnerability from variot
The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733. The device provides spam protection, email encryption, and data loss prevention. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID's CSCuu35853 and CSCuu37733. The following versions are affected: Cisco ESA Appliance Release 3.3.1-09, Release 7.5.1-gpl-022, Release 8.5.6-074
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0245", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "email security appliance", "scope": "eq", "trust": 2.5, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "3.331-09" }, { "model": "email security appliance", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.5.1-gpl-022" }, { "model": "email security appliance", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "3.3.1-09" }, { "model": "email security appliance 7.6.1-gpl-022", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3.3.1-09" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.1-gpl-022" }, { "model": "e email security the appliance", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.5.6-074" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.2" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.6" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8.0" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.5" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.5-026" }, { "model": "asyncos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.3-010" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.6.0-042" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.5.0-201" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.1-023" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "9.1.0-032" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.5.7-043" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "8.0.2-055" }, { "model": "asyncos", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7.6.3-027" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:3.331-09:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:7.5.1-gpl-022:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:email_security_appliance:8.5.6-074:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-4184" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "75181" } ], "trust": 0.3 }, "cve": "CVE-2015-4184", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-4184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-03867", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-82145", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-4184", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-03867", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201506-249", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-82145", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl-022, and 8.5.6-074 allows remote attackers to bypass intended e-mail restrictions via a malformed DNS SPF record, aka Bug IDs CSCuu35853 and CSCuu37733. The device provides spam protection, email encryption, and data loss prevention. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nThis issue is being tracked by Cisco Bug ID\u0027s CSCuu35853 and CSCuu37733. The following versions are affected: Cisco ESA Appliance Release 3.3.1-09, Release 7.5.1-gpl-022, Release 8.5.6-074", "sources": [ { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "BID", "id": "75181" }, { "db": "VULHUB", "id": "VHN-82145" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-4184", "trust": 3.4 }, { "db": "BID", "id": "75181", "trust": 2.0 }, { "db": "SECTRACK", "id": "1032582", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003078", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201506-249", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-03867", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-82145", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "id": "VAR-201506-0245", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" } ], "trust": 1.13892258 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" } ] }, "last_update_date": "2023-12-18T12:45:04.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39339", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39339" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003078" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-82145" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39339" }, { "trust": 1.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-4184" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/75181" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032582" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-4184" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150612-esa" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-03867" }, { "db": "VULHUB", "id": "VHN-82145" }, { "db": "BID", "id": "75181" }, { "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "db": "NVD", "id": "CVE-2015-4184" }, { "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03867" }, { "date": "2015-06-13T00:00:00", "db": "VULHUB", "id": "VHN-82145" }, { "date": "2015-06-12T00:00:00", "db": "BID", "id": "75181" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "date": "2015-06-13T10:59:00.067000", "db": "NVD", "id": "CVE-2015-4184" }, { "date": "2015-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03867" }, { "date": "2017-01-04T00:00:00", "db": "VULHUB", "id": "VHN-82145" }, { "date": "2015-12-08T22:05:00", "db": "BID", "id": "75181" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003078" }, { "date": "2017-01-04T17:49:16.447000", "db": "NVD", "id": "CVE-2015-4184" }, { "date": "2015-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-249" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Email Security Appliance Device Anti-spam Scanner Vulnerable to bypassing email restrictions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003078" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-249" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.