Cisco Secure Desktop Cache Cleaner '.jar' File Lets Remote Users Execute Arbitrary Commands
SecurityTracker Alert ID: 1032140|
SecurityTracker URL: http://securitytracker.com/id/1032140
(Links to External Site)
Date: Apr 15 2015
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
A vulnerability was reported in Cisco Secure Desktop. A remote user can cause arbitrary commands to be executed on the target user's system.|
A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a flaw in the Cisco-signed Java Archive (JAR) executable Cache Cleaner component and execute arbitrary commands on the target system. The commands will run with the privileges of the target user.
The vendor has assigned bug ID CSCup83001 to this vulnerability.
Cisco Host Scan standalone and CiscoAnyConnect Secure Mobility Client are not affected.
Jason Sinchak reported this vulnerability.
A remote user can create a file that, when loaded by the target user, will execute arbitrary commands on the target user's system.|
The vendor has described a configuration solution in their advisory.|
The vendor notes that the Cache Cleaner feature has been deprecated since November 2012.
Vendor URL: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150415-csd (Links to External Site)
Access control error|
|Underlying OS: Windows (Any)|
Source Message Contents
Subject: Cisco Security Advisory: Cisco Secure Desktop Cache Cleaner Command Execution Vulnerability|
-----BEGIN PGP SIGNED MESSAGE-----
Cisco Security Advisory: Cisco Secure Desktop Cache Cleaner Command Execution Vulnerability
Advisory ID: cisco-sa-20150415-csd
For Public Release 2015 April 15 16:00 UTC (GMT)
A vulnerability in a Cisco-signed Java Archive (JAR) executable Cache Cleaner component of Cisco Secure Desktop could allow an unauthenticated, remote attacker to execute arbitrary commands on the client host where the affected .jar file is executed. Command execution would occur with the privileges of the user.
The Cache Cleaner feature has been deprecated since November 2012.
There is no fixed software for this vulnerability. Cisco Secure Desktop packages that includes the affected .jar files have been removed and are not anymore available for download.
Because Cisco does not control all existing Cisco Secure Desktop packages customers are advised to ensure to ensure that their Java blacklists controls have been updated to avoid potential exploitation. Refer to the "Workarounds" section of this advisory for additional information on how to mitigate this vulnerability.
Customers using Cisco Secure Desktop should migrate to Cisco Host Scan standalone package.
This advisory is available at the following link:
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - https://gpgtools.org
-----END PGP SIGNATURE-----
cust-security-announce mailing list
To unsubscribe, send the command "unsubscribe" in the subject of your message to email@example.com