You are here
Home > Preporuke > Ranjivost u Cisco WebEx platformi

Ranjivost u Cisco WebEx platformi

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco WebEx Advanced Recording Format Remote Code Execution Vulnerability

Advisory ID: cisco-sa-20180502-war

Revision: 1.0

For Public Release: 2018 May 2 16:00 GMT

Last Updated: 2018 May 2 16:00 GMT

CVE ID(s): CVE-2018-0264

CVSS Score v(3): 9.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user.

An attacker could exploit this vulnerability by sending the user a link or email attachment with a malicious ARF file and persuading the user to follow the link or open the file. Successful exploitation could allow the attacker to execute arbitrary code on the user’s system.

The Cisco WebEx players are applications that are used to play back WebEx meeting recordings that have been recorded by an online meeting attendee. The player can be installed automatically when a user accesses a recording file that is hosted on a WebEx server.

Cisco has updated affected versions of Cisco WebEx Business Suite meeting sites, Cisco WebEx Meetings sites, Cisco WebEx Meetings Server, and the Cisco WebEx ARF Player to address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-war [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-war”]

—–BEGIN PGP SIGNATURE—–
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=YJrT
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorPetar Bertok
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco Prime File Upload servleta

Otkrivena je ranjivost u Cisco Prime File Upload servletu. Potencijalni udaljeni napadač ranjivost bi mogao iskoristiti za učitavanje proizvoljnih datoteka...

Close