You are here
Home > Preporuke > RANJIVOST U CISCO WEBEX PLATFORMI

RANJIVOST U CISCO WEBEX PLATFORMI

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Webex Network Recording Players Remote Code Execution Vulnerabilities

Advisory ID: cisco-sa-20180718-webex-rce

Revision: 1.0

For Public Release: 2018 July 18 16:00 GMT

Last Updated: 2018 July 18 16:00 GMT

CVE ID(s): CVE-2018-0379

CVSS Score v(3): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

Multiple vulnerabilities exist in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious .arf or .wrf file via email or URL and convincing the user to launch the file in the Webex recording players. Exploitation of these vulnerabilities could allow arbitrary code execution on the system of a targeted user. There is no risk when a .arf player that is stored on a Webex site is played in the Webex Network Recording Player.

The Cisco Webex players are applications that are used to play back Webex meetings that have been recorded by an online meeting attendee. The Webex Network Recording Player for .arf files can be automatically installed when the user accesses a recording that is hosted on a Webex server. The Webex Player for .wrf files can be downloaded manually.

Cisco has updated affected versions of the ARF and WRF recording players on Cisco Webex Meetings Suite sites, Cisco Webex Meetings Online sites, and Cisco Webex Meetings Server. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-rce”]

—–BEGIN PGP SIGNATURE—–
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=VPsP
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorPetar Bertok
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
RANJIVOST CISCO POLICY SUITE SOFTVERA

Otkrivena je ranjivost u Open Systems Gateway sučelju Cisco Policy Suite softvera. Ranjivost je posljedica nedovoljne autentifikacije, a potencijalnim udaljenim...

Close