A vulnerability in the Message Filter and Content Filter of the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the filtering functionality of an affected system.
The vulnerability is due to improper handling of content in .zip files. An attacker could exploit this vulnerability by sending a malicious .zip file that contains embedded executable content, which could be used to cause additional harm to the system.
Cisco has not released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160622-esa"]