You are here
Home > Preporuke > Ranjivost Cisco WebEx programskog paketa

Ranjivost Cisco WebEx programskog paketa

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco WebEx Browser Extension Remote Code Execution Vulnerability

Advisory ID: cisco-sa-20170717-webex

Revision: 1.0

For Public Release: 2017 July 17 16:00 GMT

Last Updated: 2017 July 17 16:00 GMT

CVE ID(s): CVE-2017-6753

CVSS Score v(3): 9.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in Cisco WebEx browser extensions for Google Chrome and Mozilla Firefox could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on an affected system. This vulnerability affects the browser extensions for Cisco WebEx Meetings Server, Cisco WebEx Centers (Meeting Center, Event Center, Training Center, and Support Center), and Cisco WebEx Meetings when they are running on Microsoft Windows.

The vulnerability is due to a design defect in the extension. An attacker who can convince an affected user to visit an attacker-controlled web page or follow an attacker-supplied link with an affected browser could exploit the vulnerability. If successful, the attacker could execute arbitrary code with the privileges of the affected browser.

Cisco has released software updates for Google Chrome and Mozilla Firefox that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170717-webex”]

—–BEGIN PGP SIGNATURE—–
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=lr73
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak jezgre operacijskog sustava Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja. Savjetuje se ažuriranje izdanim...

Close