First published: Thu Jun 27 2013(Updated: )
The IronPort Spam Quarantine (ISQ) component in the web framework in IronPort AsyncOS on Cisco Email Security Appliance devices before 7.1.5-106 and 7.3, 7.5, and 7.6 before 7.6.3-019 and Content Security Management Appliance devices before 7.9.1-102 and 8.0 before 8.0.0-404 allows remote attackers to cause a denial of service (service crash or hang) via a high rate of TCP connection attempts, aka Bug IDs CSCzv25573 and CSCzv81712.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IronPort AsyncOS | <=7.1.5 | |
Cisco IronPort AsyncOS | =7.3 | |
Cisco IronPort AsyncOS | =7.5 | |
Cisco IronPort AsyncOS | =7.6 | |
Cisco IronPort AsyncOS | =7.9 | |
Cisco IronPort AsyncOS | =8.0 | |
Cisco Content Security Management | ||
Cisco Email Security Appliance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3386 has been categorized with a high severity rating due to its ability to allow remote attackers unauthorized access.
To fix CVE-2013-3386, users should upgrade their IronPort AsyncOS to versions 7.1.5-106 or later, or 7.6.3-019 or later.
CVE-2013-3386 affects Cisco IronPort AsyncOS versions prior to 7.1.5-106 and specific 7.3, 7.5, 7.6 versions along with earlier versions of Content Security Management Appliances.
Yes, CVE-2013-3386 can be exploited remotely by attackers who can access the IronPort Spam Quarantine component.
The consequences of CVE-2013-3386 could include unauthorized access to sensitive data managed by the email security appliances.