Lucene search

K
ciscoCiscoCISCO-SA-20120404-WEBEX
HistoryApr 04, 2012 - 4:00 p.m.

Buffer Overflow Vulnerabilities in the Cisco WebEx Player

2012-04-0416:00:00
tools.cisco.com
8

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.206 Low

EPSS

Percentile

96.4%

The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user.

The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually installed for offline playback after downloading the application from www.webex.com[“http://www.webex.com/”].

If the WRF player was automatically installed, it will be automatically upgraded to the latest, nonvulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install a new version of the player after downloading the latest version from www.webex.com[“http://www.webex.com/”].

Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120404-webex”]

Affected configurations

Vulners
Node
ciscowebex_event_centerMatchany
OR
ciscowebex_meeting_centerMatchany
OR
ciscowebex_support_centerMatchany
OR
ciscowebex_training_centerMatchany
OR
ciscowebex_event_centerMatchany
OR
ciscowebex_meeting_centerMatchany
OR
ciscowebex_support_centerMatchany
OR
ciscowebex_training_centerMatchany

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.206 Low

EPSS

Percentile

96.4%