Executive Summary
Summary | |
---|---|
Title | Multiple Cisco WebEx Player Vulnerabilities |
Informations | |||
---|---|---|---|
Name | cisco-sa-20110201-webex | First vendor Publication | 2010-12-07 |
Vendor | Cisco | Last vendor Modification | 2011-02-01 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple buffer overflow vulnerabilities exist in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system of a targeted user. The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on the computer of an on-line meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx server. The player can also be manually installed for offline playback after downloading the application from www.webex.com If the WebEx recording player was automatically installed, it will be automatically upgraded to the latest, non-vulnerable version when users access a recording file that is hosted on a WebEx server. If the WebEx recording player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com Cisco has released free software updates that address these vulnerabilities. |
Original Source
Url : http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6 (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
WebEx WRF Player buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
75040 | Cisco WRF / ARF Players atas32.dll Crafted File Handling Remote Memory Corrup... |
75039 | Cisco WRF / ARF Players atas32.dll Crafted File Handling Remote Overflow |
75037 | Cisco WRF / ARF Players Crafted File Handling Remote Overflow |
72432 | Cisco WebEx WRF File Handling Overflow Cisco WebEx is prone to an overflow condition. The WebEx Recording Format and Advanced Recording Format Players fail to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted .wrf or .arf file, a context-dependent attacker can potentially execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Cisco Webex Player .wrf stack buffer overflow RuleID : 19226 - Revision : 13 - Type : FILE-OTHER |