Lucene search

K
nessusThis script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-20170906-ESA-EMAIL_SECURITY_APPLIANCE.NASL
HistorySep 08, 2017 - 12:00 a.m.

Cisco Email Security Appliance Malformed EML Attachment Bypass Vulnerability (cisco-sa-20170906-esa)

2017-09-0800:00:00
This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

48.4%

According to its self-reported version, the Cisco Email Security Appliance (ESA) is affected by one or more vulnerabilities. Please see the included Cisco BIDs and the Cisco Security Advisory for more information.

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(103049);
  script_version("1.7");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/03/01");

  script_cve_id("CVE-2017-12218");
  script_xref(name:"CISCO-BUG-ID", value:"CSCuz81533");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20170906-esa");

  script_name(english:"Cisco Email Security Appliance Malformed EML Attachment Bypass Vulnerability (cisco-sa-20170906-esa)");
  script_summary(english:"Checks the Cisco Email Security Appliance (ESA) version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Email Security Appliance (ESA) is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-esa
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6bf00827");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuz81533");

  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCuz81533.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-12218");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/09/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/09/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/09/08");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:email_security_appliance_(esa)");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_esa_version.nasl");
  script_require_keys("Host/AsyncOS/Cisco Email Security Appliance/DisplayVersion", "Host/AsyncOS/Cisco Email Security Appliance/Version");
  script_require_ports("Host/local_checks_enabled");

  exit(0);
}

include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");

product_info = cisco::get_product_info(name:"Cisco Email Security Appliance (ESA)");

version_list = make_list(
  "10.0.0.082",
  "8.5.5.280",
  "9.1.0.042",
  "9.6.0.042",
  "9.7.0.125",
  "9.7.1.066"
);

workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();


reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_WARNING,
  'version'  , product_info['display_version'],
  'bug_id'   , "CSCuz81533",
  'fix'      , "See advisory"
);

cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

48.4%

Related for CISCO-SA-20170906-ESA-EMAIL_SECURITY_APPLIANCE.NASL