FYI...
- https://tools.cisco....cationListing.x
Cisco Email Security Appliance MIME Header Processing Filter Bypass Vuln
- https://tools.cisco....a-20161116-esa1
16 Nov 2016 v1.0 - "Summary: A vulnerability in the email filtering functionality of Cisco AsyncOS Software for Cisco Email Security Appliances could allow an unauthenticated, remote attacker to bypass Advanced Malware Protection (AMP) filters that are configured for an affected device. The vulnerability is due to improper error handling when malformed Multipurpose Internet Mail Extensions (MIME) headers are present in an email attachment that is sent through an affected device. An attacker could exploit this vulnerability by sending an email message that has a crafted, MIME-encoded file attachment through an affected device. A successful exploit could allow the attacker to bypass AMP filter configurations for the device. There are no workarounds that address this vulnerability...
Vulnerable Products: This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for both virtual and hardware versions of Cisco Email Security Appliances, if the AMP feature is configured to scan incoming email attachments...
- http://www.securityt....com/id/1037307
CVE Reference: CVE-2016-6462
Nov 17 2016
Fix Available: Yes Vendor Confirmed: Yes ...
The vendor has assigned bug IDs CSCva13456 [CVE-2016-6462] and CSCuz85823 [CVE-2016-6463] to these vulnerabilities.
Impact: A remote user can bypass the configured AMP filters on the target system.
Solution: The vendor has issued a fix (9.7.2-131, 10.0.0-203)...
___
Cisco ASA Input Validation File Injection Vuln
- https://tools.cisco....sa-20161116-asa
16 Nov 2016 v1.0 - "Summary: A vulnerability in the HTTP web-based management interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to inject arbitrary XML commands on the affected system. The vulnerability is due to improper user input validation. An attacker could exploit this vulnerability by crafting XML input into the affected fields of the web interface. An exploit could allow the attacker to impact the integrity of the device data. There are no workarounds that address this vulnerability...
Vulnerable Products: Cisco Adaptive Security Appliance is affected...
- http://www.securityt....com/id/1037306
CVE Reference: CVE-2016-6461
Nov 17 2016
Vendor Confirmed: Yes
Version(s): 5500-X; 9.1(6.10) ...
The vendor has assigned bug ID CSCva38556 to this vulnerability...
Impact: A remote user can execute arbitrary XML commands on the target system.
Solution: The vendor has issued a fix (96.2(0.95), 97.1(6.30), 97.1(12.7), 97.1(0.55), 100.8(40.129), 100.15(0.137), 100.11(0.75))...
___
Cisco ASR 5000 Series ipsecmgr Service DoS Vuln
- https://tools.cisco....sa-20161116-asr
16 Nov 2016 v1.0 - "Summary: A vulnerability in the IPsec component of StarOS for Cisco ASR 5000 Series routers could allow an unauthenticated, remote attacker to terminate all active IPsec VPN tunnels and prevent new tunnels from establishing, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of Internet Key Exchange (IKE) messages. An attacker could exploit this vulnerability by sending crafted IKE messages toward the router. An exploit could allow the attacker to cause a reload of the ipsecmgr service. A reload of the ipsecmgr service might result in all IPsec VPN tunnels being terminated and new tunnels being unable to establish until the service has restarted, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability...
- http://www.securityt....com/id/1037308
CVE Reference: CVE-2016-6466
Nov 17 2016
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 5000/5500 Series ...
The vendor has assigned bug ID CSCva13631 to this vulnerability.
Impact: A remote user can cause the target ipsecmgr service to reload, dropping all active IPSec tunnels.
Solution: The vendor has issued a fix...