You are here
Home > Preporuke > Ranjivost Cisco AnyConnect proizvoda

Ranjivost Cisco AnyConnect proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco AnyConnect Local Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20170607-anyconnect

Revision: 1.0

For Public Release: 2017 June 7 16:00 GMT

Last Updated: 2017 June 7 16:00 GMT

CVE ID(s): CVE-2017-6638

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in how DLL files are loaded with Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to install and run an executable file with privileges equivalent to the Microsoft Windows SYSTEM account.

The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-anyconnect”]

—–BEGIN PGP SIGNATURE—–
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=HRqJ
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-06-0045-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa WebKitGTK+

Otkriveni su sigurnosni nedostaci u programskom paketu WebKitGTK+ za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close