A vulnerability in the file type detection mechanism of the Cisco Advanced Malware Protection (AMP) for Endpoints macOS Connector could allow an unauthenticated, remote attacker to bypass malware detection. The vulnerability occurs because the software relies on only the file extension for detecting DMG files. An attacker could exploit this vulnerability by sending a DMG file with a nonstandard extension to a device that is running an affected AMP for Endpoints macOS Connector. An exploit could allow the attacker to bypass configured malware detection. Cisco Bug IDs: CSCve34034.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-amp | Vendor Advisory |
https://wwws.nightwatchcybersecurity.com/2018/02/25/research-compressed-files-auto-detection-on-macos/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2018-04-19T20:00:00
Updated: 2018-04-24T05:57:02
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0237
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-04-19T20:29:00.643
Modified: 2020-09-04T18:26:53.217
Link: CVE-2018-0237
JSON object: View
Redhat Information
No data.