SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Wireless LAN Controller Vendors:   Cisco
Cisco Wireless LAN Controller HTTP URL Redirect Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1035633
SecurityTracker URL:  http://securitytracker.com/id/1035633
CVE Reference:   CVE-2016-1363   (Links to External Site)
Date:  Apr 20 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.2.x, 7.3.x, 7.4.x prior to 7.4.140.0(MD), 7.5.x, 7.6.x, 8.0.x prior to 8.0.115.0(ED)
Description:   A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted HTTP request to the target device to trigger a buffer overflow in the HTTP URL redirect function and cause the target system to reload or execute arbitrary code.

The vendor has assigned bug ID CSCus25617 to this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (7.4.140.0(MD), 8.0.115.0(ED), 8.0.132.0).

The vendor's advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd (Links to External Site)
Cause:   Boundary error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC