Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2018-00377

Опубликовано: 21 янв. 2017
Источник: fstec
CVSS3: 8.8
CVSS2: 9.3
EPSS Высокий

Описание

Уязвимость программного обеспечения для веб-конференцсвязи WebEx Extension, ActiveTouch General Plugin Container, GpcContainer Class ActiveX, WebEx Meeting Center и Download Manager ActiveX Control вызвана выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить произвольный код с повышенными привилегиями с помощью специально сформированной веб-страницы

Вендор

Cisco Systems Inc.

Наименование ПО

WebEx
Download Manager ActiveX Control
ActiveTouch General Plugin Container
GpcContainer Class ActiveX
WebEx Meeting Center
WebEx Meetings Server

Версия ПО

до 1.0.7 (WebEx)
до 2.1.0.10 (Download Manager ActiveX Control)
до 106 (ActiveTouch General Plugin Container)
до 10031.6.2017.0126 (GpcContainer Class ActiveX)
2.6_base (WebEx Meeting Center)
2.6_mr1 (WebEx Meeting Center)
2.6_mr1p1 (WebEx Meeting Center)
2.6_mr2 (WebEx Meeting Center)
2.6_mr2p1 (WebEx Meeting Center)
2.6_mr3 (WebEx Meeting Center)
2.6_mr3p1 (WebEx Meeting Center)
2.7_base (WebEx Meeting Center)
2.7_mr1 (WebEx Meeting Center)
2.7_mr1p1 (WebEx Meeting Center)
2.7_mr2 (WebEx Meeting Center)
t29_base (WebEx Meeting Center)
t30_base (WebEx Meeting Center)
t31_base (WebEx Meeting Center)
2.0_base (WebEx Meetings Server)
2.0_mr2 (WebEx Meetings Server)
2.0_mr3 (WebEx Meetings Server)
2.0_mr4 (WebEx Meetings Server)
2.0_mr5 (WebEx Meetings Server)
2.0_mr6 (WebEx Meetings Server)
2.0_mr7 (WebEx Meetings Server)
2.0_mr8 (WebEx Meetings Server)
2.0_mr8p1 (WebEx Meetings Server)
2.0_mr9 (WebEx Meetings Server)
2.0_mr9p1 (WebEx Meetings Server)
2.0_mr9p2 (WebEx Meetings Server)
2.0_mr9p3 (WebEx Meetings Server)
2.5_base (WebEx Meetings Server)
2.5_mr1 (WebEx Meetings Server)
2.5_mr2 (WebEx Meetings Server)
2.5_mr2p1 (WebEx Meetings Server)
2.5_mr3 (WebEx Meetings Server)
2.5_mr4 (WebEx Meetings Server)
2.5_mr5 (WebEx Meetings Server)
2.5_mr5p1 (WebEx Meetings Server)
2.5_mr6 (WebEx Meetings Server)
2.5_mr6p1 (WebEx Meetings Server)
2.5_mr6p2 (WebEx Meetings Server)
2.5_mr6p3 (WebEx Meetings Server)
2.6_base (WebEx Meetings Server)
2.6_mr1 (WebEx Meetings Server)
2.6_mr1p1 (WebEx Meetings Server)
2.6_mr2 (WebEx Meetings Server)
2.6_mr2p1 (WebEx Meetings Server)
2.6_mr3 (WebEx Meetings Server)
2.6_mr3p1 (WebEx Meetings Server)
2.7_base (WebEx Meetings Server)
2.7_mr1 (WebEx Meetings Server)
2.7_mr1p1 (WebEx Meetings Server)
2.7_mr2 (WebEx Meetings Server)

Тип ПО

Прикладное ПО информационных систем

Операционные системы и аппаратные платформы

Microsoft Corp Windows -

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 9,3)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170124-webex

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 99%
0.80391
Высокий

8.8 High

CVSS3

9.3 Critical

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
около 9 лет назад

An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with a

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in the Cisco WebEx Extension before 1.0.7 on Google Chrome, the ActiveTouch General Plugin Container before 106 on Mozilla Firefox, the GpcContainer Class ActiveX control plugin before 10031.6.2017.0126 on Internet Explorer, and the Download Manager ActiveX control plugin before 2.1.0.10 on Internet Explorer. A vulnerability in these Cisco WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server and Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center) when they are running on Microsoft Windows. The vulnerability is a design defect in an application programing interface (API) response parser within the extension. An attacker that can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link wit...

EPSS

Процентиль: 99%
0.80391
Высокий

8.8 High

CVSS3

9.3 Critical

CVSS2