ID

VAR-201206-0108


CVE

CVE-2012-3053


TITLE

Cisco WebEx Advanced Recording Format player Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2012-002941

DESCRIPTION

Buffer overflow in the Cisco WebEx Advanced Recording Format (ARF) player T27 L through SP11 EP26, T27 LB through SP21 EP10, T27 LC before SP25 EP11, T27 LD before SP32 CP2, and T28 L10N before SP1 allows remote attackers to execute arbitrary code via a crafted ARF file, aka Bug ID CSCtz72985. Cisco WebEx Advanced Recording Format (ARF) player Contains a buffer overflow vulnerability. The problem is Bug ID CSCtz72985 It is a problem.Skillfully crafted by a third party ARF An arbitrary code may be executed via the file. Cisco WebEx is prone to multiple remote buffer-overflow vulnerabilities because it fails to perform adequate boundary-checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the privileges of the affected application. Failed exploit attempts will result in a denial-of-service condition. Cisco WebEx is a set of Web conferencing tools developed by American Cisco (Cisco), which can assist office workers in different places to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing and enterprise instant messaging (IM). ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco WebEx Player ARF Processing Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA49751 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49751/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49751 RELEASE DATE: 2012-06-28 DISCUSS ADVISORY: http://secunia.com/advisories/49751/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49751/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49751 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in WebEx Advanced Recording Format Player, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error when processing ARF files. No further information is currently available. Successful exploitation may allow execution of arbitrary code. The vulnerability is reported in the following versions: * Client builds 28.0.0 (T28 L10N). * Client builds 27.32.1 (T27 LD SP32 CP1) and prior. * Client builds 27.25.10 (T27 LC SP25 EP10) and prior. * Client builds 27.21.10 (T27 LB SP21 EP10) and prior. * Client builds 27.11.26 (T27 L SP11 EP26) and prior. SOLUTION: Update to a fixed client build (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits iDefense and Microsoft Vulnerability Research (MSVR). ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-3053 // JVNDB: JVNDB-2012-002941 // BID: 54213 // VULHUB: VHN-56334 // PACKETSTORM: 114289

AFFECTED PRODUCTS

vendor:ciscomodel:webex advanced recording format playerscope:gteversion:28.0.0

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:ltversion:28.0.1

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:lteversion:27.11.26

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:gteversion:27.25.0

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:gteversion:27.32.0

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:gteversion:27.21.0

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:gteversion:27.11.0

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:ltversion:27.25.11

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:ltversion:27.32.2

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:lteversion:27.21.10

Trust: 1.0

vendor:ciscomodel:webex advanced recording format playerscope:lteversion:client builds 27.25.10 (t27 lc sp25 ep10)

Trust: 0.8

vendor:ciscomodel:webex advanced recording format playerscope:lteversion:client builds 27.32.1 (t27 ld sp32 cp1)

Trust: 0.8

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:client builds 28.0.0 (t28 l 10n)

Trust: 0.8

vendor:ciscomodel:webex t27 sp28scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp25 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp21 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp11 ep23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32 cp1scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lb sp21 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 l sp11 ep26scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 fr20scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t26 sp49 ep40scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lc sp22scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lb sp21 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.00

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:26.00

Trust: 0.6

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:27.11.26

Trust: 0.6

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:27.21.10

Trust: 0.6

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:27.32.1

Trust: 0.6

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:27.25.10

Trust: 0.6

vendor:ciscomodel:webex advanced recording format playerscope:eqversion:28.0.0

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.10

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.32

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.11.8

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.49.35

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp28scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp25 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp21 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp11 ep23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32 cp1scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lb sp21 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 l sp11 ep26scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 fr20scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t26 sp49 ep40scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lc sp22scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lb sp21 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.00

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.00

Trust: 0.3

vendor:ciscomodel:webex (ma t27 ld sp32scope: - version: -

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27.11.8

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.35

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:28

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:0

Trust: 0.3

sources: BID: 54213 // JVNDB: JVNDB-2012-002941 // CNNVD: CNNVD-201206-525 // NVD: CVE-2012-3053

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3053
value: HIGH

Trust: 1.0

NVD: CVE-2012-3053
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-525
value: CRITICAL

Trust: 0.6

VULHUB: VHN-56334
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3053
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56334
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56334 // JVNDB: JVNDB-2012-002941 // CNNVD: CNNVD-201206-525 // NVD: CVE-2012-3053

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-56334 // JVNDB: JVNDB-2012-002941 // NVD: CVE-2012-3053

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-525

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201206-525

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002941

PATCH

title:cisco-sa-20120627-webexurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex

Trust: 0.8

title:26205url:http://tools.cisco.com/security/center/viewAlert.x?alertId=26205

Trust: 0.8

title:cisco-sa-20120627-webexurl:http://www.cisco.com/cisco/web/support/JP/111/1115/1115508_cisco-sa-20120627-webex-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002941

EXTERNAL IDS

db:NVDid:CVE-2012-3053

Trust: 2.8

db:BIDid:54213

Trust: 0.9

db:JVNDBid:JVNDB-2012-002941

Trust: 0.8

db:CNNVDid:CNNVD-201206-525

Trust: 0.7

db:SECUNIAid:49751

Trust: 0.7

db:CISCOid:20120627 BUFFER OVERFLOW VULNERABILITIES IN THE CISCO WEBEX PLAYER

Trust: 0.6

db:NSFOCUSid:19900

Trust: 0.6

db:VULHUBid:VHN-56334

Trust: 0.1

db:PACKETSTORMid:114289

Trust: 0.1

sources: VULHUB: VHN-56334 // BID: 54213 // JVNDB: JVNDB-2012-002941 // PACKETSTORM: 114289 // CNNVD: CNNVD-201206-525 // NVD: CVE-2012-3053

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120627-webex

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3053

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3053

Trust: 0.8

url:http://secunia.com/advisories/49751

Trust: 0.6

url:http://www.securityfocus.com/bid/54213

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19900

Trust: 0.6

url:http://www.webex.com/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49751

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/49751/#comments

Trust: 0.1

url:http://secunia.com/advisories/49751/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-56334 // BID: 54213 // JVNDB: JVNDB-2012-002941 // PACKETSTORM: 114289 // CNNVD: CNNVD-201206-525 // NVD: CVE-2012-3053

CREDITS

iDefense and Microsoft Vulnerability Research (MSVR)

Trust: 0.9

sources: BID: 54213 // CNNVD: CNNVD-201206-525

SOURCES

db:VULHUBid:VHN-56334
db:BIDid:54213
db:JVNDBid:JVNDB-2012-002941
db:PACKETSTORMid:114289
db:CNNVDid:CNNVD-201206-525
db:NVDid:CVE-2012-3053

LAST UPDATE DATE

2024-11-23T21:46:20.005000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56334date:2018-12-03T00:00:00
db:BIDid:54213date:2015-03-19T09:40:00
db:JVNDBid:JVNDB-2012-002941date:2012-07-03T00:00:00
db:CNNVDid:CNNVD-201206-525date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3053date:2024-11-21T01:40:10.403

SOURCES RELEASE DATE

db:VULHUBid:VHN-56334date:2012-06-29T00:00:00
db:BIDid:54213date:2012-06-27T00:00:00
db:JVNDBid:JVNDB-2012-002941date:2012-07-03T00:00:00
db:PACKETSTORMid:114289date:2012-06-28T06:12:20
db:CNNVDid:CNNVD-201206-525date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3053date:2012-06-29T14:55:01.017