You are here
Home > Preporuke > Sigurnosni nedostatak Cisco UCS Central softvera

Sigurnosni nedostatak Cisco UCS Central softvera

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

Cisco Security Advisory: Cisco UCS Central Software Arbitrary Command Execution Vulnerability

Advisory ID: cisco-sa-20150506-ucsc

Revision 1.0

For Public Release 2015 May 6 16:00 UTC (GMT)

+———————————————————————-

Summary
=======

A vulnerability in the web framework of Cisco UCS Central Software could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device.

The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the root user.

Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150506-ucsc
—–BEGIN PGP SIGNATURE—–
Comment: GPGTools – https://gpgtools.org
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=8KjF
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorMarijo Plepelic
Cert idNCERT-REF-2015-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni propust programskog paketa mercurial

Otkriven je sigurnosni propust u programskom paketu mercurial za operacijski sustav Debian. Otkriveni propust potencijalnim napadačima omogućuje umetanje proizvoljnih naredbi....

Close