Preview Tool

Cisco Bug: CSCun36631 - EHN: URL Defang operation should account for DNS Spoofing

Last Modified

Nov 27, 2020

Products (1)

  • Cisco IronPort Email Security Appliance Software

Known Affected Releases


Description (partial)

Links from some sites are able to be followed even though they were supposed to have been defanged.

- The domain owner has taken steps to ensure that typos in the URL before the domain name are accounted for (a valid DNS response to a URL similar to
- The URL ends with a slash character (/) such that the "BLOCKED" that is added to the end is added after the trailing slash (/).
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.