6.8
CVSSv2

CVE-2015-6309

Published: 02/10/2015 Updated: 30/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in file descriptor handling of the Cisco Email Security Appliance (ESA) could allow an authenticated, remote malicious user to cause a denial of service (DoS) condition due to the affected device unexpectedly reloading. The vulnerability is due to failure to release file descriptors when the requested file action is completed. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the malicious user to cause a DoS condition due to the affected device failing to release file descriptors. When all file descriptors are in use, the device can reload unexpectedly. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit this vulnerability, an attacker must authenticate to the targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco email security appliance firmware 8.5.6-106

cisco email security appliance 9.6.0-042

Vendor Advisories

A vulnerability in file descriptor handling of the Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition due to the affected device unexpectedly reloading The vulnerability is due to failure to release file descriptors when the requested file action is completed An attacke ...