SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Cisco WebEx Meetings Server Vendors:   Cisco, WebEx
Cisco WebEx Meetings Server File Processing Flaw Lets Remote Authenticated Users Execute Arbitrary Code
SecurityTracker Alert ID:  1040709
SecurityTracker URL:  http://securitytracker.com/id/1040709
CVE Reference:   CVE-2018-0112   (Links to External Site)
Date:  Apr 18 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Client builds prior to T32.10, Server builds prior to 2.8 MR2
Description:   A vulnerability was reported in Cisco WebEx Meetings Server. A remote authenticated user can cause arbitrary code to be executed on the target user's system.

A remote authenticated user can create a specially crafted Flash ('.swf') file that, when loaded by the target meeting attendee user, will trigger an input validation flaw and execute arbitrary code on the target user's system.

Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server are affected.

The vendor has assigned bug IDs CSCvg19384 and CSCvi10746 to this vulnerability.

Alexandros Zacharis of ENISA reported this vulnerability.

Impact:   A remote authenticated user can create content that, when loaded by the target meeting attendee user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (2.8 MR2).

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wbs (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC