ID

VAR-201206-0109


CVE

CVE-2012-3054


TITLE

Cisco WebEx Recording Format player Heap-based buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-002942

DESCRIPTION

Heap-based buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 L through SP11 EP26, T27 LB through SP21 EP10, T27 LC before SP25 EP11, T27 LD before SP32 CP2, and T28 L10N before SP1 allows remote attackers to execute arbitrary code via a crafted WRF file, aka Bug ID CSCtz72977. Cisco WebEx Recording Format (WRF) player Contains a heap-based buffer overflow vulnerability. The problem is Bug ID CSCtz72977 It is a problem.Skillfully crafted by a third party WRF An arbitrary code may be executed via the file. Cisco WebEx is prone to multiple remote buffer-overflow vulnerabilities because it fails to perform adequate boundary-checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the privileges of the affected application. Failed exploit attempts will result in a denial-of-service condition. Cisco WebEx is a set of Web conferencing tools developed by American Cisco (Cisco), which can assist office workers in different places to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing and enterprise instant messaging (IM). ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco WebEx Player WRF Processing Multiple Vulnerabilities SECUNIA ADVISORY ID: SA49750 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49750/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49750 RELEASE DATE: 2012-06-28 DISCUSS ADVISORY: http://secunia.com/advisories/49750/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49750/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49750 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in WebEx Recording Format Player, which can be exploited by malicious people to compromise a user's system. 2) An error when processing the JPEG DHT chunk within a WRF file can be exploited to cause a stack-based buffer overflow. 3) An unspecified error when processing WRF files can be exploited to corrupt memory. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the following versions: * Client builds 28.0.0 (T28 L10N). * Client builds 27.32.1 (T27 LD SP32 CP1) and prior. * Client builds 27.25.10 (T27 LC SP25 EP10) and prior. * Client builds 27.21.10 (T27 LB SP21 EP10) and prior. * Client builds 27.11.26 (T27 L SP11 EP26) and prior. SOLUTION: Update to a fixed client build (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits iDefense and Microsoft Vulnerability Research (MSVR). ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-3054 // JVNDB: JVNDB-2012-002942 // BID: 54213 // VULHUB: VHN-56335 // PACKETSTORM: 114290

AFFECTED PRODUCTS

vendor:ciscomodel:webex recording format playerscope:lteversion:27.21.10

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:28.0.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:27.32.2

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:lteversion:27.11.26

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.25.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:28.0.1

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.32.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.21.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:27.25.11

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.11.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:lteversion:client builds 27.25.10 (t27 lc sp25 ep10)

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:lteversion:client builds 27.32.1 (t27 ld sp32 cp1)

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:eqversion:client builds 28.0.0 (t28 l10n)

Trust: 0.8

vendor:ciscomodel:webex t27 sp28scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp25 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp21 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp11 ep23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32 cp1scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lb sp21 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 l sp11 ep26scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 fr20scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t26 sp49 ep40scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lc sp22scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lb sp21 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.00

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:26.00

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.32.1

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.11.26

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:28.0.0

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.25.10

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.21.10

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.10

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.32

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.11.8

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.49.35

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp28scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp25 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp21 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp11 ep23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32 cp1scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lb sp21 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 l sp11 ep26scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 fr20scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t26 sp49 ep40scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lc sp22scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lb sp21 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.00

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.00

Trust: 0.3

vendor:ciscomodel:webex (ma t27 ld sp32scope: - version: -

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27.11.8

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.35

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:28

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:0

Trust: 0.3

sources: BID: 54213 // JVNDB: JVNDB-2012-002942 // CNNVD: CNNVD-201206-526 // NVD: CVE-2012-3054

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3054
value: HIGH

Trust: 1.0

NVD: CVE-2012-3054
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-526
value: CRITICAL

Trust: 0.6

VULHUB: VHN-56335
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3054
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56335
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56335 // JVNDB: JVNDB-2012-002942 // CNNVD: CNNVD-201206-526 // NVD: CVE-2012-3054

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-56335 // JVNDB: JVNDB-2012-002942 // NVD: CVE-2012-3054

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-526

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201206-526

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002942

PATCH

title:cisco-sa-20120627-webexurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex

Trust: 0.8

title:26206url:http://tools.cisco.com/security/center/viewAlert.x?alertId=26206

Trust: 0.8

title:cisco-sa-20120627-webexurl:http://www.cisco.com/cisco/web/support/JP/111/1115/1115508_cisco-sa-20120627-webex-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002942

EXTERNAL IDS

db:NVDid:CVE-2012-3054

Trust: 2.8

db:BIDid:54213

Trust: 0.9

db:JVNDBid:JVNDB-2012-002942

Trust: 0.8

db:CNNVDid:CNNVD-201206-526

Trust: 0.7

db:SECUNIAid:49750

Trust: 0.7

db:CISCOid:20120627 BUFFER OVERFLOW VULNERABILITIES IN THE CISCO WEBEX PLAYER

Trust: 0.6

db:NSFOCUSid:19900

Trust: 0.6

db:VULHUBid:VHN-56335

Trust: 0.1

db:PACKETSTORMid:114290

Trust: 0.1

sources: VULHUB: VHN-56335 // BID: 54213 // JVNDB: JVNDB-2012-002942 // PACKETSTORM: 114290 // CNNVD: CNNVD-201206-526 // NVD: CVE-2012-3054

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120627-webex

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3054

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3054

Trust: 0.8

url:http://secunia.com/advisories/49750

Trust: 0.6

url:http://www.securityfocus.com/bid/54213

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19900

Trust: 0.6

url:http://www.webex.com/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49750

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/49750/

Trust: 0.1

url:http://secunia.com/advisories/49750/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-56335 // BID: 54213 // JVNDB: JVNDB-2012-002942 // PACKETSTORM: 114290 // CNNVD: CNNVD-201206-526 // NVD: CVE-2012-3054

CREDITS

iDefense and Microsoft Vulnerability Research (MSVR)

Trust: 0.9

sources: BID: 54213 // CNNVD: CNNVD-201206-526

SOURCES

db:VULHUBid:VHN-56335
db:BIDid:54213
db:JVNDBid:JVNDB-2012-002942
db:PACKETSTORMid:114290
db:CNNVDid:CNNVD-201206-526
db:NVDid:CVE-2012-3054

LAST UPDATE DATE

2024-11-23T21:46:20.041000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56335date:2018-12-03T00:00:00
db:BIDid:54213date:2015-03-19T09:40:00
db:JVNDBid:JVNDB-2012-002942date:2012-07-03T00:00:00
db:CNNVDid:CNNVD-201206-526date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3054date:2024-11-21T01:40:10.527

SOURCES RELEASE DATE

db:VULHUBid:VHN-56335date:2012-06-29T00:00:00
db:BIDid:54213date:2012-06-27T00:00:00
db:JVNDBid:JVNDB-2012-002942date:2012-07-03T00:00:00
db:PACKETSTORMid:114290date:2012-06-28T06:12:23
db:CNNVDid:CNNVD-201206-526date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3054date:2012-06-29T14:55:01.063