Cisco Bug: CSCvu94410 - Appfault due to Extended ASCII Characters in custom SMTP response
Aug 20, 2020
- Cisco Email Security Appliance
Known Affected Releases
Symptom: The following application fault is observed when trying to submit a change in RAT: Critical: An application fault occurred: ('mail_policies/rat.py doEditAction|588', "<class 'aquarium.screen.mail_policies.rat.Error'>", '', '[util/Aquarium.py screenLoop|408] [util/InternalLibrary.py inverseExtend|328] [util/InternalLibrary.py __call__|769] [screen/Controller.py __call__|30] [util/InternalLibrary.py __call__|769] [screen/CommonController.py __call__|49] [util/InternalLibrary.py __call__|769] [screen/AppController.py __call__|196] [util/InternalLibrary.py __call__|771] [mail_policies/rat.py __call__|59] [screen/Controller.py executeAction|73] [mail_policies/rat.py doEditAction|588]') It can be found in gui_logs in displayalerts. The fault blocks any change in RAT. Conditions: Extended ASCII Characters are used in custom SMTP response text inside a RAT entry.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases