Executive Summary

Summary
TitleCisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities
Informations
Namecisco-sa-20190515-webex-playerFirst vendor Publication2019-05-15
VendorCiscoLast vendor Modification2019-05-15
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities in the Cisco Webex Network Recording Player for Microsoft Windows and the Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system.

The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file via a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. No exploit code proving exploitability of the vulnerabilities is publicly available.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-webex-player"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJc3Dq/XBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczcd8P/jRDVfR6iAZQhvzXAfawFFwB4i8E 9Z1JXk8/nDMk05hRi+BhRbxL3WBa7H1rtQX4Fe15EM9uJH9TimraRdExraFG7Pse Qve6GFOaooDTm0L+nCwza0jLYpvs5WjWu9qVqxWaiMsKUry/KP1C52gDycYaGH8M ZcAMhMJPWYgM/efIPVLK03CzlidrcVn/6ysKmktkzeFrtksNMAy7Pw5rLLUquv5z k9CVZPL9NXFKxCi4fhaCkB0h9nlS+hBMij5ByyllKbot89uUvCPO2GIyPiuv6/zM ka/lQjBNRwXwUt2IO0eu45fq3lHQnhdg15sRyASe7J2m/d361f788190K4pG/5X1 2vT1OK/l+XrTJuB9b2dNS1cWcKal80rETqK4UWSxg7GmKLlLG2EmrB6AsrfrhPYW MQudHoNq+OpXqrHyiShHNDGneV9pRvfou2TXg1H7qT2wYCoPoB/dV6/upuNnyR6R b/JndgPpiDfZ/NDLEdJF9VfgncafmgbLJzRzZViQIg9AvZLNrnF3rnBVIkPhpAiZ qfQ+b5lpdzKIU48eKkNkuGJWWGN2+9PEWC+ml3WIc/km4vPLTNhLHBlNqtGe0cy +3k/S2gZ0m6+6D8zJTuuw9s2SGIpOVfRAtUY9XGJnF9t4Gu5sVflEe20PP0gHh11k W63ncpZVABcIpfum =RXTF END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application3
Application16

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-05-20 21:21:46
  • Multiple Updates
2019-05-16 05:21:14
  • Multiple Updates
2019-05-15 21:18:37
  • First insertion