Cisco IronPort Appliances Sophos Anti-Virus Vulnerabilities (cisco-sa-20121108-sophos)

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.

Synopsis :

The remote device uses an antivirus program that is affected by
multiple vulnerabilities.

Description :

The remote Cisco IronPort appliance has a version of the Sophos
Anti-Virus engine that is or earlier. It is,
therefore, reportedly affected by the following vulnerabilities :

- An integer overflow exists when parsing Visual Basic 6

- A memory corruption issue exists in the Microsoft CAB

- A memory corruption issue exists in the RAR virtual
machine standard filters.

- A privilege escalation vulnerability exists in the
network update service.

- A stack-based buffer overflow issue exists in the PDF
file decrypter.

An unauthenticated, remote attacker could leverage these issues to
gain control of the system, escalate privileges, or cause a denial-of-

See also :

Solution :

Update to Sophos engine version as discussed in Cisco
Security Advisory cisco-sa-20121108-sophos.

Risk factor :

High / CVSS Base Score : 9.7
CVSS Temporal Score : 8.0
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 70125 ()

Bugtraq ID: 56401


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now