ID

VAR-201206-0111


CVE

CVE-2012-3056


TITLE

Cisco WebEx Recording Format player Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2012-002944

DESCRIPTION

Buffer overflow in the Cisco WebEx Recording Format (WRF) player T27 L through SP11 EP26, T27 LB through SP21 EP10, T27 LC before SP25 EP11, T27 LD before SP32 CP2, and T28 L10N before SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted WRF file, aka Bug ID CSCtz72946. Cisco WebEx Recording Format (WRF) player Contains a buffer overflow vulnerability. Cisco WebEx is prone to multiple remote buffer-overflow vulnerabilities because it fails to perform adequate boundary-checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the privileges of the affected application. Failed exploit attempts will result in a denial-of-service condition. Cisco WebEx is a set of Web conferencing tools developed by American Cisco (Cisco), which can assist office workers in different places to coordinate and cooperate. WebEx services include Web conferencing, telepresence video conferencing and enterprise instant messaging (IM). ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Cisco WebEx Player WRF Processing Multiple Vulnerabilities SECUNIA ADVISORY ID: SA49750 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49750/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49750 RELEASE DATE: 2012-06-28 DISCUSS ADVISORY: http://secunia.com/advisories/49750/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49750/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49750 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in WebEx Recording Format Player, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error when processing WRF files can be exploited to cause a heap-based buffer overflow. 2) An error when processing the JPEG DHT chunk within a WRF file can be exploited to cause a stack-based buffer overflow. 3) An unspecified error when processing WRF files can be exploited to corrupt memory. 4) An error when processing the Audio size within a WRF file can be exploited to cause a heap-based buffer overflow. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the following versions: * Client builds 28.0.0 (T28 L10N). * Client builds 27.32.1 (T27 LD SP32 CP1) and prior. * Client builds 27.25.10 (T27 LC SP25 EP10) and prior. * Client builds 27.21.10 (T27 LB SP21 EP10) and prior. * Client builds 27.11.26 (T27 L SP11 EP26) and prior. SOLUTION: Update to a fixed client build (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: The vendor credits iDefense and Microsoft Vulnerability Research (MSVR). ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-3056 // JVNDB: JVNDB-2012-002944 // BID: 54213 // VULHUB: VHN-56337 // PACKETSTORM: 114290

AFFECTED PRODUCTS

vendor:ciscomodel:webex recording format playerscope:lteversion:27.21.10

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:28.0.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:27.32.2

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:lteversion:27.11.26

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.25.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:28.0.1

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.32.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.21.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:ltversion:27.25.11

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:gteversion:27.11.0

Trust: 1.0

vendor:ciscomodel:webex recording format playerscope:lteversion:client builds 27.25.10 (t27 lc sp25 ep10)

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:lteversion:client builds 27.32.1 (t27 ld sp32 cp1)

Trust: 0.8

vendor:ciscomodel:webex recording format playerscope:eqversion:client builds 28.0.0 (t28 l 10n)

Trust: 0.8

vendor:ciscomodel:webex t27 sp28scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp25 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp21 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 sp11 ep23scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32 cp1scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 ld sp32scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep9scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lc sp25 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 lb sp21 ep10scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 l sp11 ep26scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t27 fr20scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex t26 sp49 ep40scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lc sp22scope: - version: -

Trust: 0.6

vendor:ciscomodel:webex 27lb sp21 ep3scope: - version: -

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.00

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:26.00

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.32.1

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.11.26

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:28.0.0

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.25.10

Trust: 0.6

vendor:ciscomodel:webex recording format playerscope:eqversion:27.21.10

Trust: 0.6

vendor:ciscomodel:webexscope:eqversion:27.10

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.32

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.11.8

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.49.35

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp28scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp25 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp21 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 sp11 ep23scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32 cp1scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 ld sp32scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep9scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lc sp25 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 lb sp21 ep10scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 l sp11 ep26scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t27 fr20scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os t26 sp49 ep40scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lc sp22scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac os 27lb sp21 ep3scope:eqversion:x)

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)27.00

Trust: 0.3

vendor:ciscomodel:webex (mac osscope:eqversion:x)26.00

Trust: 0.3

vendor:ciscomodel:webex (ma t27 ld sp32scope: - version: -

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27.11.8

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:26.49.35

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:28

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:27

Trust: 0.3

vendor:ciscomodel:webexscope:eqversion:0

Trust: 0.3

sources: BID: 54213 // JVNDB: JVNDB-2012-002944 // CNNVD: CNNVD-201206-528 // NVD: CVE-2012-3056

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3056
value: HIGH

Trust: 1.0

NVD: CVE-2012-3056
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201206-528
value: CRITICAL

Trust: 0.6

VULHUB: VHN-56337
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-3056
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56337
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56337 // JVNDB: JVNDB-2012-002944 // CNNVD: CNNVD-201206-528 // NVD: CVE-2012-3056

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-56337 // JVNDB: JVNDB-2012-002944 // NVD: CVE-2012-3056

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201206-528

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201206-528

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002944

PATCH

title:cisco-sa-20120627-webexurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120627-webex

Trust: 0.8

title:26209url:http://tools.cisco.com/security/center/viewAlert.x?alertId=26209

Trust: 0.8

title:cisco-sa-20120627-webexurl:http://www.cisco.com/cisco/web/support/JP/111/1115/1115508_cisco-sa-20120627-webex-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-002944

EXTERNAL IDS

db:NVDid:CVE-2012-3056

Trust: 2.8

db:BIDid:54213

Trust: 0.9

db:JVNDBid:JVNDB-2012-002944

Trust: 0.8

db:CNNVDid:CNNVD-201206-528

Trust: 0.7

db:SECUNIAid:49750

Trust: 0.7

db:CISCOid:20120627 BUFFER OVERFLOW VULNERABILITIES IN THE CISCO WEBEX PLAYER

Trust: 0.6

db:NSFOCUSid:19900

Trust: 0.6

db:VULHUBid:VHN-56337

Trust: 0.1

db:PACKETSTORMid:114290

Trust: 0.1

sources: VULHUB: VHN-56337 // BID: 54213 // JVNDB: JVNDB-2012-002944 // PACKETSTORM: 114290 // CNNVD: CNNVD-201206-528 // NVD: CVE-2012-3056

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20120627-webex

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3056

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3056

Trust: 0.8

url:http://secunia.com/advisories/49750

Trust: 0.6

url:http://www.securityfocus.com/bid/54213

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19900

Trust: 0.6

url:http://www.webex.com/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49750

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/49750/

Trust: 0.1

url:http://secunia.com/advisories/49750/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-56337 // BID: 54213 // JVNDB: JVNDB-2012-002944 // PACKETSTORM: 114290 // CNNVD: CNNVD-201206-528 // NVD: CVE-2012-3056

CREDITS

iDefense and Microsoft Vulnerability Research (MSVR)

Trust: 0.9

sources: BID: 54213 // CNNVD: CNNVD-201206-528

SOURCES

db:VULHUBid:VHN-56337
db:BIDid:54213
db:JVNDBid:JVNDB-2012-002944
db:PACKETSTORMid:114290
db:CNNVDid:CNNVD-201206-528
db:NVDid:CVE-2012-3056

LAST UPDATE DATE

2024-11-23T21:46:19.927000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56337date:2018-12-03T00:00:00
db:BIDid:54213date:2015-03-19T09:40:00
db:JVNDBid:JVNDB-2012-002944date:2012-07-03T00:00:00
db:CNNVDid:CNNVD-201206-528date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3056date:2024-11-21T01:40:10.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-56337date:2012-06-29T00:00:00
db:BIDid:54213date:2012-06-27T00:00:00
db:JVNDBid:JVNDB-2012-002944date:2012-07-03T00:00:00
db:PACKETSTORMid:114290date:2012-06-28T06:12:23
db:CNNVDid:CNNVD-201206-528date:2012-06-29T00:00:00
db:NVDid:CVE-2012-3056date:2012-06-29T14:55:01.140